Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

FBI Alert: “OnePercent Group” Ransomware

The FBI has learned of a cyber-criminal group who self-identifies as the “OnePercent Group” and who have used Cobalt Strike…

Cyber Command Hosts 2021 Reserve Components Summit

U.S. Cyber Command hosted its 10th Annual Reserve Components (RC) Summit on August 20-21. The summit was held in two…

Ransomware Awareness for Holidays and Weekends

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have observed an increase in highly…

Army Lab Gets Green Light for Supercomputing Project

The U.S. Department of Defense (DoD) High-Performance Computing Modernization Program announced its selection of an Army supercomputing project for fiscal…

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver…

Defeating Malicious Cyber Actors Requires Partnerships

Participating on a panel alongside other high-level officials from the federal, state, and private sector, National Security Agency Deputy Director…

NSA, CISA Release Kubernetes Hardening Guidance

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released a cybersecurity technical report, “Kubernetes…

NIST Study on Kids’ Passwords Shows Gap Between Knowledge of Password Best Practices and Behavior

NIST researchers surveyed kids in 3rd – 12th grade about their password knowledge and practices. The study found that children…

AFRL Updates Advanced Computing Tech BAA

On August 5, the U.S. Air Force Research Laboratory (AFRL) posted an updated broad agency announcement (BAA) for Advancing Computing…

CISA Provides Recommendations for Protecting Information From Ransomware-Caused Data Breaches

CISA has released the fact sheet “Protecting Sensitive and Personal Information From Ransomware-Caused Data Breaches” to address the increase in…

Ethical, Legal Implications of Paying Ransoms

Ransomware has emerged as one of the most virulent cybersecurity risks. In recent years, particularly during the pandemic, ransomware attacks…

How to Defeat the Info-Warfare “Triad of Disruption”

According to this article, social media technologies, propaganda, and false news have posed unprecedented challenges to the U.S. government and…