Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Senate Passes Strengthening American Cybersecurity Act of 2022

This bill addresses cybersecurity threats against critical infrastructure and the federal government. The Cybersecurity and Infrastructure Security Agency (CISA) must…

West Point, Annapolis Come Together Through STEM

U.S. Military Academy cadets and Naval Academy midshipmen met up on a different field of friendly strife on February 5…

NSA Publishes Best Practices for Selecting Cisco Password Types

The National Security Agency (NSA) published guidance today to help administrators secure network infrastructure devices and their credentials. The “Cisco…

U.S. Department of Defense Releases New Cyber-Resilient Weapon Systems Body of Knowledge

The U.S. Department of Defense announced today the release of the Cyber-Resilient Weapon Systems Body of Knowledge (CRWS-BoK) Portal Version…

ALIAS Equipped Black Hawk Helicopter Completes First Uninhabited Flight

The DARPA Aircrew Labor In-Cockpit Automation System (ALIAS) program completed the first-ever flight of a UH-60A Black Hawk helicopter without…

NIST Seeks Input to Update Cybersecurity Framework, Supply Chain Guidance

To keep pace with the always-evolving cybersecurity landscape, the National Institute of Standards and Technology (NIST) is planning to revise…

Are Fault-Tolerant Quantum Computers on the Horizon?

It’s been hypothesized that quantum computing will one day revolutionize information processing across a range of military and civilian applications…

Free Cybersecurity Services and Tools

As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and…

Realignment of Responsibility for Cybersecurity Maturity Model Certification (CMMC) Program

On February 2, Deputy Secretary of Defense Kathleen H. Hicks directed the realignment of responsibility for the Cybersecurity Maturity Model…

Guide to Bluetooth Security – SP 800-121 Rev. 2

Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks…

DoD Software Modernization Strategy Approved

The Department of Defense (DoD) Software Modernization Strategy was approved on February 1. The DoD Software Modernization Strategy sets a…

Securing Distributed Energy Resources

Industrial Internet of Things (IIoT) devices at the grid edge are increasing rapidly and transforming the power grid. Their connectivity, the conduit through…