Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Next Level MFA: FIDO Authentication

Many of us know that enabling multifactor authentication (MFA) is the single most important thing Americans can do to stay…

U.S. Department of Commerce Appoints Members for New Internet of Things Advisory Board

WASHINGTON — The U.S. Department of Commerce has appointed 16 experts for the new Internet of Things Advisory Board (IoTAB),…

DARPA Selects Teams to Protect Computers’ “Roots of Trust” From Exploits

Cyber attackers hunt for exploits in computing systems via a phenomenon colloquially described as “weird machines.” Simply translated, the phrase…

DoD Cyber Training Academy Aims to Arm Students With Essential Cybersecurity Tools

To meet the continuously evolving cybersecurity threats facing the United States, the Defense Department established what is now known as…

A Machine Learning-Based Solution Could Help Firefighters Circumvent Deadly Backdrafts

A lack of oxygen can reduce even the most furious flame to smoldering ash. But when fresh air rushes in,…

SCuBA Dives Deeper to Help Federal Agencies Secure Their Cloud Environments

In April, CISA announced the Secure Cloud Business Applications (SCuBA) project to help secure federal civilian executive branch (FCEB) information…

Space Force Embeds Cyber Squadrons Into Delta Missions

Schriever Space Force Base, Colo. —  The Orbital Defense Initiation, or ODIN, is Space Delta 9’s initial training course where…

DARPA’s CASTLE to Fortify Computer Networks

DARPA is accepting proposals using artificial intelligence (AI) to create realistic environments and train cyber agents to counter advanced persistent…

Cryptocurrency Investment Schemes

The FBI Miami Field Office, in coordination with the Internet Crime Complaint Center (IC3), warns of investment schemes involving cryptocurrency,…

Announcement of Proposal to Convert FIPS 198-1, “The Keyed-Hash Message Authentication Code (HMAC),” to a NIST Special Publication

As a part of the periodic review of NIST’s cryptographic standards and guidelines, NIST’s Crypto Publication Review Board announced the review of FIPS…

NIST IoT Cybersecurity Program Releases Two New Documents

NIST’s Cybersecurity for the Internet of Things (IoT) program has released two new documents: The final version of Profile of the…

CISA Directs Federal Agencies to Improve Asset Visibility and Vulnerability Detection

WASHINGTON – On October 3, 2022, the Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive (BOD) 23-01, Improving…