CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

UPCOMING WEBINAR

AI cyberspace internet defense soldier

Agentic Artificial Intelligence: Strategic Adoption in the U.S. Department of Defense

Agentic artificial intelligence (AI) is emerging as a transformative capability for the U.S. Department of Defense (DoD). Agentic AI systems can execute complex tasks independently. Unlike traditional AI, these agents can proactively analyze data, make decisions, and act with minimal human intervention. Within the DoD, the concept of agentic warfare reflects a growing shift from…

Read More...

Has the Defense Modeling and Simulation (M&S) catalog been updated since 2018, and is this an effort that the Defense M&S Coordination Office is still updating/overseeing?

Read More...
a hand holding digital gearwheels with digital network lines

The 2nd Annual R&D Workshop on Protecting the Software and Hardware Supply Chain: Demonstrating Improvement Over Time

The Department of Homeland Security Science and Technology (DHS S&T) cyber community of interest (COI) and the Networking and Information Technology Research and Development (NITRD) Cyber Security and Information Assurance Interagency Working Group (CSIA IWG) are excited to once again co-host the workshop on protecting the software and hardware supply chain.  This year’s focus is…

Read More...

How can someone access Defense Technical Information Center manuscripts in batches at a speed usable for training embedders for use with large language models?

Read More...
Long-term goals for the Communications-Electronics Command (CECOM) Software Engineering Center (SEC) include incorporating Zero Trust further into Army and DOD systems and developing workforce training programs around the organization’s methodology.

Open Standards That Support Zero Trust Implementation

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) was tasked with researching and providing information on open standards applicable to zero trust implementation. CSIAC identified various open standards being used today that support and uphold the implementation of the zero trust architecture within the U.S. Department of Defense.

Read More...
avoid risk reduce transfer

Cyber Risk Management: Program Development for Risk-Based Decision-Making

This discussion provides attendees with an understanding of how to construct a comprehensive risk management program. This includes developing a governance structure, a risk appetite statement, and related policies and procedures.  The publication “Advancing Risk Management Capability Using the OCTAVE FORTE Process” helps gain an understanding of the framework and underpinnings of this discussion.  This…

Read More...
Artist's interpretation of new optical processor for an edge device, developed by NIT researchers, that performs machine learning computations at the speed of light, classifying wireless signals in a matter of nanoseconds. (Image credit: Sampson Wilcox, Research Laboratory of Electronics)

Photonic Processor Could Streamline 6G Wireless Signal Processing

As more connected devices demand an increasing amount of bandwidth for tasks like teleworking and cloud computing, it will become extremely challenging to manage the finite amount of wireless spectrum available for all users to share. Engineers are employing artificial intelligence to dynamically manage the available wireless spectrum, with an eye toward reducing latency and…

Read More...
modern circuit board, image created on Canva

New Protocol Demonstrates and Verifies Quantum Speedups in a Jiffy

While breakthrough results over the past few years have garnered headlines proclaiming the dawn of quantum supremacy, they have also masked a nagging problem that researchers have been staring at for decades:  Demonstrating the advantages of a quantum computer is only half the battle; verifying that it has produced the right answer is just as…

Read More...
closeup of soldier holding a communications device strapped to his chest

Breaking Through the Noise:  WSComm’s Revolution in Spectrum Sharing

In today’s hyperconnected world, wireless communication faces a critical challenge known as the “spectrum crunch.” Spectrum crunch results from more devices vying for limited frequencies, creating an overcrowded radio frequency spectrum — a bottleneck that disrupts communication. Spectrum crunch threatens not only everyday conveniences like cellphone connectivity but also essential services, such as emergency response…

Read More...
An Air Force MQ-9 Reaper remotely piloted aircraft, assigned to the 432nd Wing, taxis toward the runway at Creech Air Force Base, Nev., April 15, 2025.

DARPA Calls on Industry to Assist With Improving, Strengthening DoD Cybersecurity

The Defense Advanced Research Projects Agency announced a Resilient Software Systems Accelerator program to kick-start the widespread adoption of math-based software development practices to make military systems inherently more secure against cyberthreats. During the Resilient Software Systems Colloquium held in Arlington, Virginia, leaders from the Defense Department, DARPA, and industry spoke about aging IT infrastructure,…

Read More...

UPCOMING EVENTS

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

CyberBay 2025

CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"