Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Ongoing Cyber Threats to U.S. Water and Wastewater Systems

This joint advisory is the result of analytic efforts between the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure…

Army-Wide Planning Team Tackles Next Steps for Talent Modernization

Army modernization is not just about materiel or capabilities solutions – it is also about modernizing the talent pool responsible…

Historic Deployment of Cyber Forces With Bomber Task Force Europe

In a historic deployment, a U.S. Cyber Command Cyber Protection Team (CPT) defended critical data on B-1B Lancers assigned to…

NIST Seeks Public Input on Consumer Software Labeling for Cybersecurity

In an effort to improve consumers’ ability to make informed decisions about software they purchase, the National Institute of Standards…

Avoid Dangers of Wildcard TLS Certificates, the ALPACA Technique

NSA released the Cybersecurity Information Sheet, “Avoid Dangers of Wildcard TLS Certificates and the ALPACA Technique” today, warning network administrators…

CISA, FBI, and NSA Release Joint Cybersecurity Advisory on BlackMatter Ransomware

CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released joint Cybersecurity Advisory (CSA): BlackMatter Ransomware….

Securing the Industrial Internet of Things

The Industrial Internet of Things (IIoT) refers to the application of instrumentation and connected sensors and other devices to machinery…

Americans Need a Bill of Rights for an AI-Powered World

In the past decade, data-driven technologies have transformed the world around us. We’ve seen what’s possible by gathering large amounts…

Summit Highlights DoD’s Cybersecurity Initiatives, Challenges

Some of the cybersecurity challenges the Defense Department faces and some of its key initiatives include the highlight of a…

Two Individuals Sentenced for Providing “Bulletproof Hosting” for Cybercriminals

Two Eastern European men were sentenced for providing “bulletproof hosting” services, which were used by cybercriminals between 2009 to 2015…

U.S. Air Force and University Scientists Share Their Vision for Unconventional Computing

Conventional computing hardware represents information as ones and zeros, depending on the state of electronic transistors. This creates artificial bottlenecks…

Request for Information (RFI) on an Implementation Plan for a National Artificial Intelligence Research Resource

The Office of Science and Technology Policy and the National Science Foundation are issuing this Request for Information (RFI) to…