Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
nrl

NRL Research Physicists Explore Fiber Optic Computing Using Distributed Feedback

WASHINGTON  –  U.S. Naval Research Laboratory (NRL) researchers deliver a novel contribution to fiber optics computing. The Fiber Optic Computing Using Distributed…

face

Deepfake Defense Tech Ready for Commercialization, Transition

The threat of manipulated media has steadily increased as automated manipulation technologies become more accessible and social media continues to…

nist CSF 2.0

NIST Releases Version 2.0 of Landmark Cybersecurity Framework

The National Institute of Standards and Technology (NIST) has updated the widely used Cybersecurity Framework (CSF), its landmark guidance document…

Hacker

CISA, U.S., and International Partners Warn of Ongoing Exploitation of Multiple Ivanti Vulnerabilities

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center…

CSA: Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

FORT MEADE, Md. – The National Security Agency (NSA) has joined the Federal Bureau of Investigation (FBI) and other co-sealers…

AFIMSC spearheads AI innovation at industry forum

AFIMSC Spearheads AI Innovation at Industry Forum

SAN ANTONIO, Texas – More than 120 industry, academic, and government officials gathered Feb. 20-21 at the University of Texas…

niobium

Resurrecting Niobium for Quantum Science

For years, niobium was considered an underperformer when it came to superconducting qubits. Now scientists supported by Q-NEXT have found…

Winning paper for the 11th annual Best Scientific Cybersecurity Paper Competition Graphic

NSA Awards Authors of Study of Automated Attacks on New Webservers

The National Security Agency (NSA) Research Directorate recently selected “Uninvited Guests:  Analyzing the Identity and Behavior of Certificate Transparency Bots,” as…

JFHQ DODIN

JFHQ-DODIN Officially Launches its New Cyber Operational Readiness Assessment Program

Following a successful nine-month pilot, Joint Force Headquarters — Department of Defense Information Network (JFHQ-DODIN) is officially launching its Cyber…

cyber graphic showing an open lock; photo source: Canva, GraphicsFuel

The Post-Quantum Cryptography

Safe digital communication for organizations and individuals is protected online by using cryptography, whether making an online purchase from a favorite online store or sending an email to a friend or colleague. Imagine the impact if cybercriminals could break the cryptographic algorithms used to encrypt all our banking, medical information and history, or any sensitive data we use in our day-to-day digital life.

graphic of computer monitor with images of soldiers and helicopters on it; photo source: Canva

Modeling & Simulation: Battle Readiness in a Virtual World

As the world becomes more complex, the U.S. Department of Defense (DoD) faces a range of challenges that demands innovative solutions. One tool that has proven invaluable in this regard is modeling and simulation (M&S)—the process of creating a representation of a system or process and then using that representation to explore and test different scenarios.

graphic showing an iceberg with people and aircraft above the water line (photo source: Canva)

Dark Net Usage for Countries in Conflict

For many, the “dark web” harbors a stigma. After the rise of notorious “dark net markets” like “Silk Road” and “AlphaBay” in the early 2010s, pop culture has come to equate the “dark web” with illegality and contraband.