CYBERSECURITY

& Information Systems Digest

1 JULY 2025

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

3d-internet-secuirty-badge-with-lock
JULY IS RANSOMWARE AWARENESS MONTH

Ransomware Awareness Month aims to educate individuals and organizations about what ransomware is, the dangers it poses, and protective measures they can take to combat it. Ransomware attacks involve malware encrypted to lock a computer and render its files and their systems unusable. Malicious actors then demand a ransom for decryption and its release.

The Cybersecurity and Infrastructure Security Agency (CISA) provides their #StopRansomware Guide​ which outlines ​​best practices to detect, prevent, respond, and recover from potential attacks.

Learn more and download the CISA guide here:  https://www.cisa.gov/stopransomware​.​​​​​

FEATURED ARTICLE

The U.S. Air Force MQ-9A operates from a flight test facility in the continental United States. Source: U.S. Air Force

Accelerating Cyber Resilience: Air Force, DARPA Join Forces to Strengthen Cyber Defenses

A strong, lethal military demands cutting-edge and resilient software to power every weapon and support system our U.S. Warfighters depend on. However, the U.S. Department of Defense’s (DoD’s) reliance on aging IT infrastructure, using security policies developed over the last 30 years, creates inherent vulnerabilities in its systems, from legacy architectures to advanced weapons. Meanwhile,…

Read More...

Featured Notable Technical Inquiry

Analyst, Working, With Business Concept, Digital Transformation Technology, Analytics

Artificial Intelligence/Machine-Learning (AI/ML) Tools

Artificial intelligence (AI) and machine learning (ML) are transforming the ways organizations interact with data and generate insights from it.  This report introduces key concepts present using AI for data analytics and highlights the most recent tools and platforms in the field.  Several commercial, government, or open-source software tools were identified during research.  These tools could be used to leverage AI/ML to support the inquirer…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

image of a brain with circuits integrated into the silhouette.

AI Reliability Risk Assessment

Reliability of a military system refers to its ability to complete a specific mission without failure. Failure modes in traditional acquisition systems often involve hardware, software, and human-systems integration. These failure modes are generally well-understood and can be mitigated early in design. As artificial intelligence (AI) and autonomous products are incorporated in military systems, mission…

Read More...

UPCOMING EVENTS

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

TechNet Emergence 2025

Join the TechNet Emergence 2025 conference on July 15-16 at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…

Black Hat USA 2025

Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of specialized cybersecurity training (August 2-5), with courses for all skill…

Voice From the Community

Rober-Urias-Picture-1x1
Rober Urias

Cyberspace Manager, Space Systems Command

Rober Urias serves as the Vandenberg SFB Space Launch Delta 30 Alternate Information Systems Security Manager, and Cyberspace Manager in support of Space Systems Command (SSC), and Space Operations Command (SpOC). He develops and manages base-wide cybersecurity programs, as well as computer and network security for unique national security critical command and control systems. His focus is on establishing and publishing base-wide policy to manage the INFOSEC, COMPUSEC, COMSEC, TEMPEST, and RMF programs, and provide advice and guidance in its implementation and in procedures used, in the development and operation of systems.

Want to be featured in our Digest?

Submit your "Voice From the Community"