CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

UPCOMING WEBINAR

Satellite Cybersecurity

As satellites become integral to global communications, navigation, and defense, they are increasingly targeted by advanced cyberthreats. Cybersecurity in cyberspace is a versatile field dedicated to safeguarding digital information and infrastructure from a spectrum of cyberthreats and attacks. This presentation examines the critical cybersecurity challenges facing satellite networks, from ground stations to onboard systems. It…

Read More...

Assessing DoD Mission Resilience: A Guide to Cyber DT&E

This webinar provides takeaways for applying the brand-new DoD Cyber Developmental Test & Evaluation (DT&E) Guidebook Version 3. Topics covered will include the following: An introduction to the DoD Cyber DT&E Guidebook (Version 3) Exploring the guidebook’s core principles using a hypothetical system (Emergency Enterprise System) focusing on: The crucial role of the Cyber Working…

Read More...

Jason Scott Kurtz

Read More...
U.S. Air Force Col. Jonathan Zall, Advanced Battle Management System Cross-Functional Team Capability Integration chief, center, answers participating industry partners questions during the Department of the Air Force’s first Decision Advantage Sprint for Human-Machine Teaming, or DASH, experiment, at the Howard Hughes Operations, or H2O, Center in Las Vegas, Nev., April 8, 2025. This two-week event brought together operational warfighters and industry and Shadow Operations Center-Nellis software developers to prototype microservices aimed at accelerating and improving decision-making in high-tempo battle management scenarios framed by the Transformational Model. (The image has been cropped to focus on the subjects.) (U.S. Air Force photo)

Air Force DASH Sprint Pioneers Human-Machine Teaming for Faster Battle Management Decisions

LAS VEGAS, Nev. – The Department of the Air Force took a bold step toward future command and control capabilities with the successful completion of its first Decision Advantage Sprint for Human-Machine Teaming, or DASH, experiment, recently held at the Howard Hughes Operations Center, or H2O, in Las Vegas, NV. “The DASH experiment showed how…

Read More...
Members of the team who created the CURBy quantum random number generator. From left to right, Jasper Palfree (University of Colorado Boulder), Gautam Kavuri (NIST) and Krister Shalm (NIST). Credit: NIST

NIST and Partners Use Quantum Mechanics to Make a Factory for Random Numbers

Randomness is incredibly useful. People often draw straws, throw dice, or flip coins to make fair choices. Random numbers can enable auditors to make completely unbiased selections. Randomness is also key in security; if a password or code is an unguessable string of numbers, it’s harder to crack. Many of our cryptographic systems today use…

Read More...
U.S. Cyber Command operators participate in Cyber Guard 25-2 exercise on June 3, 2025, at Fort George G. Meade, MD. The exercise, in coordination with the Joint Staff, simulates scenarios that test response protocols and defensive and offensive techniques across geographic areas of responsibility.

USCYBERCOM Demonstrates Global Cyber Superiority With Cyber Guard 25-2

FORT MEADE, Md. — U.S. Cyber Command launched its annual training exercise Cyber Guard 25-2 on June 2, bringing together elite cyber professionals from across the U.S. Department of Defense to project lethality in cyberspace. Cyber Guard 25-2 focuses on offensive and defensive cyber operations, bringing together military units, government agencies, and allied partners to…

Read More...
In a talk at Lawrence Livermore National Laboratory (LLNL) on May 30, Stanford University professor and AI visionary Fei-Fei Li traced a sweeping arc in visual intelligence and AI — a narrative she hopes ultimately leads to a more human-centered future.

Stanford Professor Discusses Future of Visually Intelligent Machines and Human-AI Collaboration

In a talk at Lawrence Livermore National Laboratory (LLNL) on May 30, Stanford University professor and AI visionary Fei-Fei Li traced a sweeping arc in visual intelligence and AI — a narrative she hopes ultimately leads to a more human-centered future. Part of the Director’s Distinguished Lecturer Series, the Stanford computer scientist went beyond technical…

Read More...
OASIC seeks to vastly reduce the cost, set-up time, and support equipment overhead of large quantum research laboratories (pictured) with chipscale technologies (inset) in modular, quickly reconfigurable facilities. Source: Inset image: MIT Lincoln Laboratory; Atomic Physics Laboratory image: Mukund Vengalattore

Small Business Accelerates Transition of Quantum Tech From Lab to Market

Breakthroughs in quantum technologies for computing, sensing, and communications can take decades to transition from laboratory to real-world use. This is, in part, due to the need for extensive laboratory setups to maintain the highly delicate quantum states of atoms, which very quickly lose coherence (i.e., their “quantumness”) when disturbed by the slightest interference of…

Read More...
data dots and waves

AI Research to Improve How We Find and Use Critical Information

The University of Maryland Applied Research Laboratory for Intelligence and Security (ARLIS), through its INSURE academic consortium, is supporting a research project to develop context-aware multimodal information retrieval systems – a next-generation capability that could transform how intelligence and security professionals access and analyze complex data. The project, led by Dr. Alan McMillan at the…

Read More...
This is a complicated hybrid network with multiple vulnerabilities, and you can’t just protect it with a simple firewall the way you would if all your assets were inside the Head Office. Zero trust architectures can help. (Credit: N. Hanacek/NIST)

NIST Offers 19 Ways to Build Zero Trust Architectures

If you’re trying to secure your organization’s computer network from cyberattacks, traditional approaches may not work. Gone are the days when you could keep all your electronic assets inside a single building and construct a firewall between them and the wider internet. Now you have remote workers logging in from distant cities and Cloud-based software…

Read More...

UPCOMING EVENTS

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

TechNet Emergence 2025

Join the TechNet Emergence 2025 conference on July 15-16 at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…

Black Hat USA 2025

Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of specialized cybersecurity training (August 2-5), with courses for all skill…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"