Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

The Key to Securing Legacy Computing Systems

DARPA wants to overhaul legacy software to stop cyberattackers in their tracks when they penetrate a system. For a cyberattack…

CISA Releases Updated Zero Trust Maturity Model

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) published Zero Trust Maturity Model version 2, incorporating recommendations from a…

Hack-A-Sat Competition Highlights On-Orbit Hacking

ROME, N.Y. (AFRL) — The U.S. Department of the Air Force, or DAF, in collaboration with the Air Force Research…

U.S. and International Partners Publish Secure-by-Design and Default Principles and Approaches 

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA),…

NTIA Seeks Public Input to Boost AI Accountability

WASHINGTON – The Department of Commerce’s National Telecommunications and Information Administration (NTIA) launched a request for comment (RFC) to advance…

CISA’s Pre-ransomware Notifications Help Organizations Stop Attacks Before Damage Occurs

Over the past several years, ransomware attacks have caused extraordinary harm to American organizations:  schools forced to close, hospitals required…

Show Us the Proof: Formal Methods Can Be Applied at Large Scale

Engineering practices for software-reliant systems have evolved steadily over many decades, and so too have the assurance techniques that confirm…

NIST’s National Cybersecurity Center of Excellence Renews Partnerships With State, County

ROCKVILLE, Md. — The Department of Commerce’s National Institute of Standards and Technology (NIST), the state of Maryland, and Montgomery…

DARPA Seeks Input to Advance Hybrid Quantum/Classical Computers

Although fault-tolerant quantum computers are projected to be years to decades away, processors made from tens to hundreds of quantum…

Four Years Later: The Impacts of Ghidra’s Public Release

FORT MEADE, Md. — Four years ago at the 2019 RSA Conference, the National Security Agency (NSA) released Ghidra, a…

Senators Rosen, Blackburn Debut Cyber “Reserve” Workforce Bills

WASHINGTON, DC – U.S. Senators Jacky Rosen (D-NV) and Marsha Blackburn (R-TN) are introducing a legislative package of two bills…

Hackers Could Try to Take Over a Military Aircraft; Can a Cyber Shuffle Stop Them?

ALBUQUERQUE, N.M. — A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle…