Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

NSA Releases Top Ten Cloud Security Mitigation Strategies

FORT MEADE, Md. – The National Security Agency (NSA) is releasing “Top Ten Cloud Security Mitigation Strategies” to inform cloud…

NIST to Launch Competition for AI-Focused Manufacturing USA Institute

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) plans to announce an open…

CISA Publishes Repository for Software Attestation and Artifacts

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) announces the availability of the Repository for Software Attestation and Artifacts…

nrl

NRL Research Physicists Explore Fiber Optic Computing Using Distributed Feedback

WASHINGTON  –  U.S. Naval Research Laboratory (NRL) researchers deliver a novel contribution to fiber optics computing. The Fiber Optic Computing Using Distributed…

face

Deepfake Defense Tech Ready for Commercialization, Transition

The threat of manipulated media has steadily increased as automated manipulation technologies become more accessible and social media continues to…

nist CSF 2.0

NIST Releases Version 2.0 of Landmark Cybersecurity Framework

The National Institute of Standards and Technology (NIST) has updated the widely used Cybersecurity Framework (CSF), its landmark guidance document…

Hacker

CISA, U.S., and International Partners Warn of Ongoing Exploitation of Multiple Ivanti Vulnerabilities

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center…

CSA: Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

FORT MEADE, Md. – The National Security Agency (NSA) has joined the Federal Bureau of Investigation (FBI) and other co-sealers…

AFIMSC spearheads AI innovation at industry forum

AFIMSC Spearheads AI Innovation at Industry Forum

SAN ANTONIO, Texas – More than 120 industry, academic, and government officials gathered Feb. 20-21 at the University of Texas…

niobium

Resurrecting Niobium for Quantum Science

For years, niobium was considered an underperformer when it came to superconducting qubits. Now scientists supported by Q-NEXT have found…

Winning paper for the 11th annual Best Scientific Cybersecurity Paper Competition Graphic

NSA Awards Authors of Study of Automated Attacks on New Webservers

The National Security Agency (NSA) Research Directorate recently selected “Uninvited Guests:  Analyzing the Identity and Behavior of Certificate Transparency Bots,” as…

JFHQ DODIN

JFHQ-DODIN Officially Launches its New Cyber Operational Readiness Assessment Program

Following a successful nine-month pilot, Joint Force Headquarters — Department of Defense Information Network (JFHQ-DODIN) is officially launching its Cyber…