Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
red warning button; photo source: 123RF.com

A Defense-In-Depth and Layered Approach to Software Supply Chain Security

In this article, we will discuss the confluence and utility of using software supply chain (SSC)-focused frameworks (The Updated Framework [TUF] and the in-toto framework), combined with behavioral approaches using artificial intelligence (AI) aligned with the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), to generate a truly comprehensive approach for SSC security [1]. Such a “defense-in-depth” approach recognizes that these frameworks by themselves fall short of addressing the guidelines for the integrity of SSCs.

Graph Nueral Networks

Researchers at ORNL Demonstrate Scalability of GNNs on World’s Most Powerful Computing Systems

Solving today’s most complex scientific challenges often means tracing links between hundreds, thousands, or even millions of variables. The larger…

A graphic shows the watch floor of Navy Fleet Cyber Command.

US Can Respond Decisively to Cyber Threat Posed by China

The cyber challenge posed by China is unlike any challenge ever faced by the US and its allies, said the…

Students from UCSD visit March ARB to help incorporate Artificial Intelligence into MQ-9 Platform

Battle Looming Between AI and Counter-AI, Says Official

The Defense Department is just at the start of using artificial intelligence. “Peer competitors are as well,” said Jude R….

Transport Layer Security 1.3

New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol

Companies in major industries such as finance and health care must follow best practices for monitoring incoming data for cyberattacks….

CISA NSA China CI

U.S. and International Partners Publish Cybersecurity Advisory on People’s Republic of China State-Sponsored Hacking of U.S. Critical Infrastructure

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI), along…

Stony Brook Quantum Information Laboratory

SBU Research Team Takes Major Step Toward a Functioning Quantum Internet

A team of Stony Brook University physicists and their collaborators have taken a significant step toward the building of a…

AFWERX Autonomy Prime partners demonstrate autonomous flight capabilities, make history at AGILE FLAG

AFWERX Autonomy Prime Partners Demonstrate Autonomous Flight Capabilities, Make History at AGILE FLAG

SACRAMENTO, Calif. (AFRL) – AFWERX Autonomy Prime partner Xwing Inc. made history by flying the first autonomous logistics mission as…

GEN Nakasone and Lt Gen Haugh

Senate Votes to Confirm Lt. Gen. Timothy Haugh to Lead CYBERCOM and NSA/CSS

FORT MEADE, Md. — The U.S. Senate voted to confirm President Joseph R. Biden, Jr.’s nomination of U.S. Air Force…

DARPA Reboots AI Tools for Adult Learning Competition

Technological advances and changes in economic conditions are shifting the skills needed to build an adaptive and successful workforce. As…

Federal Workforce: Actions Needed to Improve the Transfer of Personnel Security Clearances and Other Vetting Determinations

The Office of the Director of National Intelligence (ODNI) and the Office of Personnel Management (OPM)—two agencies with key personnel…

Cybersecurity Speaker Series: Preparing for Post-Quantum

FORT MEADE, Md. – Cryptography is our first and last line of defense for the nation’s most sensitive systems. The…