Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide

The Department of Justice unsealed two indictments today charging four defendants, all Russian nationals who worked for the Russian government,…

NIST Releases Assessment Procedures for Enhanced Security Requirements, NIST Special Publication 800-172A

NIST has released Special Publication (SP) 800-172A, “Assessing Enhanced Security Requirements for Controlled Unclassified Information,” to support the protection of…

Senate Passes Strengthening American Cybersecurity Act of 2022

This bill addresses cybersecurity threats against critical infrastructure and the federal government. The Cybersecurity and Infrastructure Security Agency (CISA) must…

West Point, Annapolis Come Together Through STEM

U.S. Military Academy cadets and Naval Academy midshipmen met up on a different field of friendly strife on February 5…

NSA Publishes Best Practices for Selecting Cisco Password Types

The National Security Agency (NSA) published guidance today to help administrators secure network infrastructure devices and their credentials. The “Cisco…

U.S. Department of Defense Releases New Cyber-Resilient Weapon Systems Body of Knowledge

The U.S. Department of Defense announced today the release of the Cyber-Resilient Weapon Systems Body of Knowledge (CRWS-BoK) Portal Version…

ALIAS Equipped Black Hawk Helicopter Completes First Uninhabited Flight

The DARPA Aircrew Labor In-Cockpit Automation System (ALIAS) program completed the first-ever flight of a UH-60A Black Hawk helicopter without…

NIST Seeks Input to Update Cybersecurity Framework, Supply Chain Guidance

To keep pace with the always-evolving cybersecurity landscape, the National Institute of Standards and Technology (NIST) is planning to revise…

Are Fault-Tolerant Quantum Computers on the Horizon?

It’s been hypothesized that quantum computing will one day revolutionize information processing across a range of military and civilian applications…

Free Cybersecurity Services and Tools

As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and…

Realignment of Responsibility for Cybersecurity Maturity Model Certification (CMMC) Program

On February 2, Deputy Secretary of Defense Kathleen H. Hicks directed the realignment of responsibility for the Cybersecurity Maturity Model…

Guide to Bluetooth Security – SP 800-121 Rev. 2

Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks…