Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
USAF personnel looking at a computer screen

DISA’s DoDNet Program Office Drives Progress in the Next Pivotal Phase of Network Optimization

The Defense Information Systems Agency (DISA) is advancing the migration of users to its modernized network, DoDNet, as part of…

graphic of a tractor

Eliminating Memory Safety Vulnerabilities Once and for All

Memory safety vulnerabilities are the most prevalent type of disclosed software vulnerability and affect a computer’s memory in two primary…

NIST Releases First Three Finalized Post-Quantum Encryption Standards

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has finalized its principal set…

graphic of lines and dots

Evaluating Trust and Safety of Large Language Models

Amid the skyrocketing popularity of large language models (LLMs), researchers at Lawrence Livermore National Laboratory are taking a closer look…

CISA Releases Secure by Demand Guide

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the “Secure by Demand…

CELR test environment

Keeping Our Seaports Cyber Secure

A new cutting-edge Control Environment Laboratory Resource (CELR) platform developed by the Science and Technology Directorate (S&T) and Cybersecurity and…

city skyline with network graphics on top

CISA Releases Playbook for Infrastructure Resilience Planning

WASHINGTON – Today, the Cybersecurity and Infrastructure Security Agency (CISA) released a companion guide to the Infrastructure Resilience Planning Framework…

graphic depicting network and industry icons

NIST Announces Funding Opportunity for AI-Focused Manufacturing USA Institute

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has announced an open competition…

More than 250 data scientists, coders and developers referred to as “hackers,” gathered to develop prototypes within set timeframes to initiate and validate innovative concepts in Stuttgart Germany, June 7, 2024. BRAVO Hackathons, sponsored by senior Department of Defense leaders, foster innovative environments where government and industry collaborate to test bold ideas using real DOD data. (U.S. Army photo by Staff Sgt. Aaron Daugherty)

AFWERX Integration Prime Accelerates Innovation at USEUCOM’s BRAVO 101 Hackathon

WRIGHT-PATTERSON AIR FORCE BASE, Ohio (AFRL) — AFWERX Integration Prime facilitated collaboration and spurred innovation at the U.S. European Command…

NSA’s Final Zero Trust Pillar Report Outlines How to Achieve Faster Threat Response Time

FORT MEADE, Md. – The National Security Agency (NSA) is releasing the Cybersecurity Information Sheet (CSI) “Advancing Zero Trust Maturity…

Widespread IT Outage Due to CrowdStrike Update

Widespread IT Outage Due to CrowdStrike Update

Note: CISA will update this Alert with more information as it becomes available. Update 12:00 p.m., EDT, July 24, 2024:…

https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3849499/nsa-joins-fbi-and-others-to-warn-of-north-korea-cyber-espionage-campaign/

NSA Joins FBI and Others to Warn of North Korea Cyber Espionage Campaign

FORT MEADE, Md. – The National Security Agency (NSA) joins the Federal Bureau of Investigation (FBI) and others in releasing…