Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
CMMC_Webcast_May_13_News_Story_banner

Strategic Direction for Cybersecurity Maturity Model Certification (CMMC) Program

The Department of Defense announced the strategic direction of the Cybersecurity Maturity Model Certification (CMMC) program, marking the completion of…

NSA 5G

NSA and CISA Provide Cybersecurity Guidance for 5G Cloud Infrastructures

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have published cybersecurity guidance to securely build…

On-site graphic

Ongoing Cyber Threats to U.S. Water and Wastewater Systems

This joint advisory is the result of analytic efforts between the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure…

size0-full_Army

Army-Wide Planning Team Tackles Next Steps for Talent Modernization

Army modernization is not just about materiel or capabilities solutions – it is also about modernizing the talent pool responsible…

U.S. Cyber Command enables defense of 9EBS BTF Europe in cyberspace

Historic Deployment of Cyber Forces With Bomber Task Force Europe

In a historic deployment, a U.S. Cyber Command Cyber Protection Team (CPT) defended critical data on B-1B Lancers assigned to…

software-label-rev

NIST Seeks Public Input on Consumer Software Labeling for Cybersecurity

In an effort to improve consumers’ ability to make informed decisions about software they purchase, the National Institute of Standards…

nsa wildcard

Avoid Dangers of Wildcard TLS Certificates, the ALPACA Technique

NSA released the Cybersecurity Information Sheet, “Avoid Dangers of Wildcard TLS Certificates and the ALPACA Technique” today, warning network administrators…

1000w_q95 (3)

CISA, FBI, and NSA Release Joint Cybersecurity Advisory on BlackMatter Ransomware

CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released joint Cybersecurity Advisory (CSA): BlackMatter Ransomware….

pp-energy-iiot-banner

Securing the Industrial Internet of Things

The Industrial Internet of Things (IIoT) refers to the application of instrumentation and connected sensors and other devices to machinery…

fingerprintBLUE

Americans Need a Bill of Rights for an AI-Powered World

In the past decade, data-driven technologies have transformed the world around us. We’ve seen what’s possible by gathering large amounts…

Cyber,Security,And,Digital,Data,Protection,Concept.,Icon,Graphic,Interface

Summit Highlights DoD’s Cybersecurity Initiatives, Challenges

Some of the cybersecurity challenges the Defense Department faces and some of its key initiatives include the highlight of a…

Hacker,With,Computers,In,Dark,Room.,Cyber,Crime

Two Individuals Sentenced for Providing “Bulletproof Hosting” for Cybercriminals

Two Eastern European men were sentenced for providing “bulletproof hosting” services, which were used by cybercriminals between 2009 to 2015…