Simulation-Based Testing for DoD Software
Hosted by: Jeremy Loomis, Alex Matthews
December 8, 2022 12:00 pmThe Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify artificial intelligence (AI) tools that support the implementation of NIST 800-53 Risk Management Framework Revision 5. These AI tools should be capable of answering controls, validating security technical implementation guides, maintaining current documentation, and capturing artifacts in an effort to reduce manual efforts and expedite time to resolution. If you have any […]
Learn MoreArtificial intelligence (AI) and machine learning (ML) are transforming the ways organizations interact with data and generate insights from it. This report introduces key concepts present using AI for data analytics and highlights the most recent tools and platforms in the field. Several commercial, government, or open-source software tools were identified during research. These tools could be used to leverage AI/ML to support the inquirer […]
Learn MoreScientists at the Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, have demonstrated a working capability that can radically accelerate the testing of qubits — the quantum computing equivalent of bits — accomplishing in a matter of minutes what has previously taken days or even weeks. As quantum computers based on superconducting qubits have increased in capacity in recent years, a worrisome and recurring […]
Learn MoreRICHLAND, Wash.—It’s obvious when a dog has been poorly trained. It doesn’t respond properly to commands. It pushes boundaries and behaves unpredictably. The same is true with a poorly trained artificial intelligence (AI) model. Only with AI, it’s not always easy to identify what went wrong with the training. Research scientists globally are working with a variety of AI models that have been trained on […]
Learn MoreThe United States’ special operations forces community has made commendable progress in embracing and integrating artificial intelligence into the battlespace over the past year, but it still has room to grow to keep pace with adversaries like China. That was one of the key messages from the fireside chat at Special Operations Forces (SOF) Week 2025 in Tampa, Florida. Technology experts explored SOF’s use of […]
Learn MoreDARPA and the State of Maryland have established a cooperative effort, the Capital Quantum Benchmarking Hub, to test and evaluate quantum computing prototypes and systems for national security and commercial applications. The Capital Quantum Benchmarking Hub is part of DARPA’s Quantum Benchmarking Initiative (QBI), which aims to verify and validate which, if any, quantum computing approach can achieve an industrially useful quantum computer by 2033. […]
Learn MoreBYLINE: Soham Hans, Research Engineer, ICT After receiving my Masters in Computer Science from USC Viterbi School of Engineering, I joined ICT, to work under the supervision of Dr. Volkan Ustun in the Human-inspired Adaptive Teaming Systems (HATS) Lab. My research focus today includes multi-agent systems, procedural content generation, multi-modal LLM, multi-agent LLM, and multi-step reasoning – essentially making engineering systems with intelligence that reason, […]
Learn MorePaul Revere determined which route to ride using lantern signals – one lamp signal if the British took the land route, two if they went by water. During the Civil War, aeronautics experts started experimenting with hot air balloons to provide situational awareness. Today, our modern systems, which help monitor and secure our borders, must rely on more sophisticated methods to alert to danger at […]
Learn MoreWASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS) Science and Technology Directorate (S&T), and Idaho National Laboratory (INL) recently hosted Louisiana State University (LSU) and several energy industry and critical infrastructure partners to train against simulated, high-impact cyberattacks on operational technology (OT) and traditional information technology (IT) at CISA’s Control Environment Laboratory Resource (CELR) in Idaho Falls, Idaho. LSU […]
Learn MoreFort Huachuca, AZ –The United States Army Network Enterprise Technology Command (NETCOM) is excited to announce the implementation of the Army Unified Directory Service (AUDS), a cutting-edge cloud-based directory and device management solution. This transition marks a significant step in transforming Army operations and extending capabilities for the Warfighter, ensuring seamless connectivity and enhanced security across the globe. AUDS is designed to streamline user and […]
Learn MoreCSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.
Hosted by: Jeremy Loomis, Alex Matthews
December 8, 2022 12:00 pmThe discipline of software testing is changing to align with the automated processes of Agile DevSecOps. Automated testing is executed by running test scripts or scenarios against the System Under Test (SUT) without human intervention. With many types of software (such as U.S. Department of Defense [DoD] applications), a challenging aspect of this testing is…
Unlocking Data Power and AI Innovation in Government: Join Qlik’s annual, one-day event dedicated to empowering the Public Sector with the latest technology in data analytics, data quality, artificial intelligence (AI) and decision intelligence. Discover…
Join the TechNet Emergence 2025 conference on July 15-16 at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…
Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of specialized cybersecurity training (August 2-5), with courses for all skill…
Senior Vice President, Intelligence Programs at Owl Cyber Defense
Art Wilson is an experienced executive with demonstrated success delivering
computer, information, and network security solutions. He is a strong information technology professional skilled in information security, crossdomain solutions, information assurance, security-enhanced Linux, security assessments, and reverse engineering and has over 30 years of experience working with end users and customers to define architectures and solutions.
The latest releases from the Cybersecurity & Information Systems Information Analysis Center (CSIAC).
Submit your "Voice From the Community"