Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Automatic Proofs of Differential Privacy

Previously, we have discussed some differentially private algorithms and implementation bugs that can cause these algorithms to fail to protect…

DARPA Open Sources FETT Bug Bounty Hardware Evaluation Platform, Tools

Last year, DARPA conducted its first bug bounty program – the Finding Exploits to Thwart Tampering (FETT) Bug Bounty – to evaluate…

United States Government Launches First One-Stop Ransomware Resource at StopRansomware.gov

WASHINGTON – Today, as part of the ongoing response, agencies across the U.S. government announced new resources and initiatives to…

Hanscom AFB Team Supports ‘Revolutionary’ Zero Trust Effort

HANSCOM AIR FORCE BASE, Mass. (AFNS) — Personnel from the AFNet Sustainment and Operations Branch at Hanscom Air Force Base are partnering…

Defense Official Testifies About DOD Information Technology, Cybersecurity Efforts

John Sherman told the House Armed Services Committee’s panel on cyber, innovative technologies and information systems that cloud computing is…

DOD Demonstrates Mobile Microgrid Technology

The Office of the Undersecretary of Defense for Research and Engineering and the Department of the Army recently demonstrated a…

NSA, Cybercom Leader Says Efforts Have Expanded

Adversaries have heavily invested in cyberspace operations and capabilities. As such, cyber operations, cybersecurity and information operations are increasingly important…

Canadian Navy Team Wins DOD’s Annual Cyber Defense Exercise

A team from the Royal Canadian Navy came out on top in the Defense Department’s annual Cyber Flag 21-2 training…

Nellis AFB empowers warfighters via DevSecOps

-ELLIS AIR FORCE BASE, Nev. (AFNS) — The Department of the Air Force Rapid Capabilities Office is using multiple technologies to build…

Hypergaming for Cyber – Strategy for Gaming a Wicked Problem

Hypergaming analysis as a tool for examining conflicts, situations, and constructs has been used liberally throughout numerous environments for decades….

Can the “Gorilla” Deliver? Assessing the Security of Google’s New “Thread” Internet of Things (IoT) Protocol

Security incidents associated with Internet of Things (IoT) devices have recently gained high visibility, such as the Mirai botnet that…

Rebooting Letters of Marque for Private Sector, Active Cyber Defense

The views expressed in this paper are those of the author and do not reflect the official policy or position…