Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Transforming Vulnerability Management: CISA Adds OASIS CSAF 2.0 Standard to ICS Advisories

In our pursuit to “transform the vulnerability management landscape,” CISA is excited to announce that our security advisories for industrial…

DoD to Establish AI Battle Labs in EUCOM, INDOPACOM

Two BRAVO artificial intelligence (AI) battle labs will be established at the U.S. European Command (EUCOM) and Indo-Pacific Command (INDOPACOM),…

CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month With New Public Awareness Campaign to Secure Our World

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) announced the kickoff of the 20th Cybersecurity Awareness Month. Throughout October,…

AFRL’s Newest Supercomputer “Raider” Promises to Compute Years’ Worth of Data in Days, Saving Time, Money

WRIGHT-PATTERSON AIR FORCE BASE, Ohio (AFRL) – The U.S. Air Force Research Laboratory, or AFRL, is now home to its…

U.S. and International Partners Release Report on Russian Cyber Actors Using “Infamous Chisel” Malware

WASHINGTON – The U.S. Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), National Security Agency (NSA), and…

denial of service

CISA Releases Capacity Enhancement Guide to Strengthen Agency Resilience to DDoS Attack

CISA has released actionable guidance for Federal Civilian Executive Branch (FCEB) agencies to help them evaluate and mitigate the risk…

New ONR Mobile App Available to Download

A new mobile app from the Office of Naval Research (ONR) is just a download away – expanding ONR’s reach…

NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers

Last year, the National Institute of Standards and Technology (NIST) selected four algorithms designed to withstand attack by quantum computers….

Digital Frontlines: The Marines’ Battle in the Virtual Trenches of Cyber Flag 23-2

To safeguard virtual spaces that house national secrets, power our daily lives, and influence global interactions, the United States Marine…

How NETCOM Leads the Army to a Secure Network

FORT HUACHUCA, Ariz. — Zero-trust is a collection of concepts and ideas that assume no trust exists within a defined…

Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) warned…

Researchers Strengthen Defenses Against Common Cyberattack

RICHLAND, Wash.—Scientists have developed a better way to recognize a common internet attack, improving detection by 90 percent compared to…