CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

UPCOMING WEBINAR

profile of woman with graphics of charts swirling around her head

Current Guidance for Test and Evaluation of Artificial Intelligence

As the Defense Department accelerates incorporating artificial intelligence (AI) in all aspects of defense, the importance of rigorous test and evaluation (T&E) grows. In this webinar, contributors to the Developmental Test, Evaluation, and Assessment (DTE&A) T&E of AI Guidebook will offer practical insights on T&E of AI systems. Attendees will learn how to integrate this…

Read More...
Members of the Colorado National Guard's Task Force Cyber help Colorado Secretary of State’s Office and Office of Information Technology to monitor network traffic and protect election infrastructure.

Bridging Cybersecurity Gaps in Small Business Security Operation Centers (SOCs) Using Artificial Intelligence (AI)-Enabled Tools

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) was tasked with researching cybertools and technologies to differentiate between various cyberevents and behaviors. CSIAC identified common cybersecurity shortcomings of small businesses, with the correlation between the size of an organization and its access to viable cybertools, technologies, and intelligence. CSIAC also identified how artificial intelligence…

Read More...
Dr. Brandon Perelman manages DEVCOM ARL's Human Autonomy Teaming program. (U.S. Army photo)

Army Advances Research in Robotics, AI, and Autonomy

ADELPHI, Md. — In recognition of National Robotics Week, U.S. Army researchers highlight some of their groundbreaking work aimed at advancing the future of human-machine integration for the battlefield. The U.S. Army Combat Capabilities Development Command Army Research Laboratory’s (known as DEVCOM ARL) robotics research spans across ground and air autonomous systems and energy systems…

Read More...
The Air Force is driving adoption of generative artificial intelligence (AI) through tailored, role-based training to empower Airmen and Guardians to work more efficiently and effectively. The effort, spearheaded by the Air Force Research Laboratory (AFRL), focuses on equipping personnel with the knowledge and skills to use generative AI tools responsibly and ethically across a range of mission-critical functions. (U.S. Air Force graphic)

Tailoring Generative AI: A Secure Sandbox and the Need for Role-Specific Training and Resources

JOINT BASE SAN ANTONIO-RANDOLPH, Texas – How the Air Force is driving adoption of generative artificial intelligence (AI) through tailored, role-based training to empower Airmen and Guardians to work more efficiently and effectively was presented to attendees during this Air Education and Training Command Force Development Summit on March 25. The effort, spearheaded by the…

Read More...
CSA: Fast Flux: A National Security Threat (Image credit: NSA)

NSA and Partners Issue Guidance on Fast Flux as a National Security Threat

FORT MEADE, Md. – The National Security Agency (NSA) and partners are releasing the joint Cybersecurity Advisory (CSA), “Fast Flux:  A National Security Threat,” to warn about how cyber actors are using a technique called fast flux to conceal their activities by rapidly changing the IP address associated with a domain name. The fast flux…

Read More...
Securing Artificial Intelligence for Battlefield Effective Robustness (SABER) shield logo

Sharpening AI Warfighting Advantage on the Battlefield

As artificial intelligence (AI) becomes increasingly integrated into modern warfare, ensuring its security and resilience is critical to national defense. Like any new technology, AI has weaknesses. Researchers have demonstrated that AI-enabled systems can be tricked or manipulated via different “attacks.” But even these demonstrations have mostly been done in lab conditions, where researchers have…

Read More...
The U.S. Space Force published its Data and Artificial Intelligence FY 2025 Strategic Action Plan, March 19, 2025. (U.S. Air Force graphic)

Space Force Publishes 2025 Data, AI Strategic Action Plan

ARLINGTON, Va. (AFNS) — The U.S. Space Force published its Data and Artificial Intelligence (AI) Fiscal Year (FY) 2025 Strategic Action Plan, providing a clear, actionable path toward becoming a more data-driven and AI-enabled force capable of achieving the Defense Department’s mission to deter war and, when necessary, decisively defeat adversaries. “As the world’s first…

Read More...
hand pointing toward "AI"

Generative AI Wargaming Promises to Accelerate Mission Analysis

A team at the Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, is creating an artificial intelligence-driven capability that automates much of the work that goes into designing, setting up, developing, and running wargames. The effort holds promise to dramatically amplify the impact and value of wargames and similar exercises for the military and…

Read More...
NICE Framework Work Role Categories

NICE Framework Components Version 2.0.0 – Changes & Updates

Did you know the NICE Workforce Framework for Cybersecurity (NICE Framework) version 2.0.0 was recently released? The NICE Framework establishes a standard approach and common language for describing cybersecurity work and learner capabilities. The NICE Framework seeks to improve how to identify, recruit, develop, and retain cyber talent. NICE Framework components include work role categories;…

Read More...
Privacy Framework wheel (Credit: N. Hanacek/NIST)

NIST Updates Privacy Framework, Tying It to Recent Cybersecurity Guidelines

How can society benefit from the use of personal data while also protecting individual privacy? Five years after debuting guidelines that can help organizations balance these goals, the National Institute of Standards and Technology (NIST) has drafted a new version of the NIST Privacy Framework intended to address current privacy risk management needs, maintain alignment…

Read More...

UPCOMING EVENTS

2025 Department of the Air Force Modeling & Simulation (M&S) Summit

The goal of the M&S Summit is to gather U.S. Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services and with industry experts, and hear…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"