CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead &…

Learn More

UPCOMING WEBINAR

CSIAC Journal Cover Vol. 8 No. 2 with graphic of a soldier in combat gear on it.

CSIAC 2024: Volume 8 Issue 2

The CSIAC Journal is a publication of the Cybersecurity & Information Systems Information Analysis Center (CSIAC). CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) with policy oversight provided by the Office of the Under Secretary of Defense (OUSD) for Research and Engineering (R&E). CSIAC is operated by...

Read More...
graphic of a scale

Artificial Intelligence in Cybersecurity: How Substituting and Scaling Impact Investment Returns

With the growing integration of artificial intelligence (AI) in cybersecurity, this article investigates the economic principles of substitution and scale’s elasticity to evaluate their impact on the return on security investment. Recognizing the potential of AI technologies to substitute human labor and traditional cybersecurity mechanisms and the significance of cost ramifications of scaling AI solutions...

Read More...
graphic of a satellite

Optimization and Analysis for Defense Simulation Models

When performing defense system analysis with simulation models, a great deal of time and effort is expended creating representations of real-world scenarios in U.S. Department of Defense (DoD) simulation tools. However, once these models have been created and validated, analysts rarely retrieve all the knowledge and insights that the models may yield and are limited...

Read More...
black and white graphic of a soldier in combat gear

Navigating Challenges and Opportunities in the Cyber Domain With Sim2real Techniques

In the digital age, the cyber domain has become an intricate network of systems and interactions that underpin modern society. Sim2Real techniques, originally developed with notable success in domains such as robotics and autonomous driving, have gained recognition for their remarkable ability to bridge the gap between simulated environments and real-world applications. While their primary...

Read More...
graphic of a microchip with electric pulses coming from it

Low-Power Cybersecurity Attack Detection Using Deep Learning on Neuromorphic Technologies

Neuromorphic computing systems are desirable for several applications because they achieve similar accuracy to graphic processing unit (GPU)-based systems while consuming a fraction of the size, weight, power, and cost (SWaP-C). Because of this, the feasibility of developing a real-time cybersecurity system for high-performance computing (HPC) environments using full precision/GPU and reduced precision/neuromorphic technologies was...

Read More...
graphic of a mountain with a flag on top

Extreme Zero Trust

Zero Trust Architecture (ZTA) has become a mainstream information security philosophy. Many commercial enterprises are in varying stages of their journeys in adopting and implementing ZTA. Similarly, federal policy has moved toward ZTA, motivated by actions such as Executive Order 14028 and guided by NIST 800-207 and CISA’s Zero Trust Maturity.

Read More...

Mazaher Kianpour

Read More...

Benjamin Thengvall

Read More...

Jose Ramirez

Read More...

Emily A. Nack

Read More...

UPCOMING EVENTS

TechNet Indo-Pacific

TechNet Indo-Pacific is a strategic event in the Indo-Pacific Rim. This year’s conference — “Free – Open – Secure” — focuses on the critical issues identified by regional military leaders to maintain and protect data…

GridSecCon 2024

NERC, the E-ISAC, and the Midwest Reliability Organization (MRO) are co-hosting the 13th annual grid security conference, GridSecCon 2024, on October 22 – 25 in Minneapolis, Minnesota at the Hyatt Regency. Join industry and government…

2024 National Cyber Summit

National Cyber Summit is a three-day event that focuses on innovative cyber security technology, offering unique educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. The National Cyber Summit offers several different…

AI4SE & SE4AI Research and Application Workshop 2024

The fifth annual AI4SE and SE4AI workshop is sponsored and organized by the U.S. Army DEVCOM Armaments Center Systems Engineering Directorate and the Systems Engineering Research Center and will be hosted at the George Mason…

14th Annual Peak Cyber Symposium

The Information Systems Security Association (ISSA) – Colorado Springs Chapter is delighted to announce the return of the 14th Annual Peak Cyber Symposium at The Antlers Hotel, Colorado Springs, CO. The event days will be…

28th Annual IEEE High-Performance Extreme Computing Virtual Conference

The High-Performance Extreme Computing Virtual Conference (HPEC) is a large New England computing conference focusing on the convergence of high-performance and embedded computing. The HPEC community is interested in computing hardware, software, systems, and applications…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"