Receive a digest of the latest in cybersecurity and information systems straight to your inbox
Technical Research and Analysis Services
The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is a component of the U.S. Department of Defense’s Information Analysis Center (IAC) enterprise.
Technical Focus Areas
What We Do
As a DoD IAC, we provide a number of resources and services to help you in your research and provide you with focused expert assistance and unbiased scientific and technical information.
Stay up-to-date with our digest
Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior. Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these…
In response to the repeated attacks on the U.S. Department of Defense (DoD) supply chain, the release of the Cybersecurity Maturity Model Certification (CMMC) introduces a verification mechanism that will ensure the necessary security mechanisms…
A privacy impact assessment (PIA) is an essential element for effective privacy by design. It enables privacy leaders to be assured that the privacy controls implementation satisfies regulations and organizational requirements and is key to…
The DoD Cybersecurity Policy Chart
Captures the tremendous breadth of applicable cybersecurity policies in a helpful organizational scheme
Participating on a panel alongside other high-level officials from the federal, state, and private sector, National Security Agency Deputy Director George Barnes discussed NSA’s role within the nation’s shared response to future malicious cyber activities…
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released a cybersecurity technical report, “Kubernetes Hardening Guidance,” that details threats to Kubernetes environments and provides configuration guidance to minimize risk.
NIST researchers surveyed kids in 3rd – 12th grade about their password knowledge and practices. The study found that children are learning best practices, such as memorizing passwords, but are demonstrating a gap between their…
Ready to submit a technical inquiry?
Receive free information research on technical topics