Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Open-Source Data Is Everywhere – Except the Army’s Concept of Information Advantage

Three months ago, as Russia invaded Ukraine, the world watched as Twitter exploded with real-time data, reporting, and analysis of…

AI-Powered App Aims to Discover Talent in Guard, Reserve

Members of the Reserve and National Guard are highly skilled across a variety of private-sector industries and have the potential…

DoD: It’s Not Just State Actors Who Pose Cyber Threat to US

“It’s not just hackers operating at the behest of adversarial nation states who pose a threat to U.S. cyber infrastructure…

DoD’s Largest Annual IT, Cyberpower Event Resumes In-Person Attendance

The Defense Department’s largest annual information technology and cyber event returns to in-person attendance this summer. Over the last two years,…

NIST Awards Funding to Strengthen Advanced Manufacturing for Critical and Emerging Technologies

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has awarded a total of $2.08…

NSA Hosts the Maryland Department of IT in Cybersecurity Workshop

FORT MEADE, Md. — The Maryland Department of Information Technology (DoIT) executive team took part in a series of cybersecurity…

CISA Issues Emergency Directive Requiring Federal Agencies Mitigate Vulnerabilities in VMware Products

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive (ED) 22-03 today requiring federal civilian executive branch agencies running specific…

Case Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Response

Cyber-enabled espionage against the United States has been a challenge for more than 20 years and is likely to remain…

Army Junior ROTC Cyber Pilot to Help Bridge Cybersecurity Gap

Representatives from the U.S. Army, academia, and industry celebrated the kickoff of the Army Junior ROTC Cyber Pilot Program on…

AFMC Utilizes MOATEL as Verification Resource

The Munition Open Architecture Test and Evaluation Laboratory (MOATEL) provides the independent verification missing from open architecture by validating models…

Guide to Operational Technology (OT) Security

This initial public draft provides guidance on how to improve the security of OT systems while addressing their unique performance,…

2021 Top Routinely Exploited Vulnerabilities

CISA, the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Australian Cyber Security Centre (ACSC), the Canadian…