Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Hack-A-Sat’s Moonlighter Satellite Deploys to Low Earth Orbit After Last Month’s Successful Launch

ROME, N.Y. (AFRL) —  Moonlighter reached low earth orbit July 5 after a short visit at the International Space Station…

Safeguarding the Nation With Untitled Goose Tool

LIVERMORE, Calif. — Programmers at Sandia National Laboratories are helping the Cybersecurity and Infrastructure Security Agency protect the nation through…

Take the First Steps Toward Better Cybersecurity With These Four Goals

Every day, organizations across our country are impacted by cyber intrusions, many of which affect the delivery of essential services….

Army Designates Quantum Information Science Research Center

ADELPHI, Md. — Secretary of the Army Christine E. Wormuth designated the U.S. Army Combat Capabilities Development Command’s Army Research…

New Cybersecurity Advisory Warns About Web Application Vulnerabilities

FORT MEADE, Md. – The National Security Agency (NSA) has partnered with U.S. and international cyber agencies to release the…

Protecting the Power Grid Against Cyberattacks

Tristen Mullins enjoys the hidden side of computers. As a signals processing engineer for the Department of Energy’s Oak Ridge…

Chief Digital & Artificial Intelligence Office Celebrates First Year

The Chief Digital & Artificial Intelligence Office (CDAO) reached one year of operations with several achievements in creating, implementing, and…

National Cyber Workforce and Education Strategy Released

The Biden-Harris Administration unveiled the National Cyber Workforce and Education Strategy (NCWES), a first-of-its-kind comprehensive approach aimed at addressing both…

NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments

Software development and delivery supply chains are attractive targets for malicious cyber actors. They can use these environments to compromise…

The FinOps Revolution

By adopting the financial operations framework, the Army can control and predict costs while maximizing the benefits of cloud computing….

DARPA Seeks a New Gold Standard in Cybersecurity

It’s no secret that developers and cyberspace defenders must accurately understand risks within software and hardware to maintain a robust…

AI Revolutionizes Mapping Updates, Accuracy

An NGA Small Business Innovation Research (SBIR) partner is well on its way to creating an artificial intelligence (AI)-powered prototype…