Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Driving Simulator Boosts Readiness for Connecticut Guard

EAST GRANBY, Conn. – The Connecticut National Guard’s 103rd Airlift Wing at Bradley Air National Guard Base is using computer-generated…

NIST Announces Winners of the CommanDING Tech Challenge

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has announced the winners of…

https://www.shutterstock.com/image-photo/digital-crime-by-anonymous-hacker-1095422036

Treasury Sanctions Illicit Marketplace Genesis Market

WASHINGTON — The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) took action to designate Genesis Market,…

The Key to Securing Legacy Computing Systems

DARPA wants to overhaul legacy software to stop cyberattackers in their tracks when they penetrate a system. For a cyberattack…

CISA Releases Updated Zero Trust Maturity Model

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) published Zero Trust Maturity Model version 2, incorporating recommendations from a…

Hack-A-Sat Competition Highlights On-Orbit Hacking

ROME, N.Y. (AFRL) — The U.S. Department of the Air Force, or DAF, in collaboration with the Air Force Research…

U.S. and International Partners Publish Secure-by-Design and Default Principles and Approaches 

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA),…

NTIA Seeks Public Input to Boost AI Accountability

WASHINGTON – The Department of Commerce’s National Telecommunications and Information Administration (NTIA) launched a request for comment (RFC) to advance…

CISA’s Pre-ransomware Notifications Help Organizations Stop Attacks Before Damage Occurs

Over the past several years, ransomware attacks have caused extraordinary harm to American organizations:  schools forced to close, hospitals required…

Show Us the Proof: Formal Methods Can Be Applied at Large Scale

Engineering practices for software-reliant systems have evolved steadily over many decades, and so too have the assurance techniques that confirm…

NIST’s National Cybersecurity Center of Excellence Renews Partnerships With State, County

ROCKVILLE, Md. — The Department of Commerce’s National Institute of Standards and Technology (NIST), the state of Maryland, and Montgomery…

DARPA Seeks Input to Advance Hybrid Quantum/Classical Computers

Although fault-tolerant quantum computers are projected to be years to decades away, processors made from tens to hundreds of quantum…