Notable Task Orders (TOs)

We conduct customer-funded TOs that expand the limits of the free technical inquiry service.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Entity Resolution for the Cyber Domain

The foundational level of situation awareness lies in perception of the surrounding environment. In cyberspace, this relates to an ability to enumerate and identify elements of the cyber terrain, particularly, network-connected devices that are employed…

Securing the Soft Underbelly of a Supercomputer With BPF Probes

With the evolution of modern technology, many organizations are now embracing big data solutions to drive decision-making by uncovering patterns, trends, and correlations in a massive amount of raw data. Subsequently, the adoption of big…

Joint Software Assurance (SwA) Cyber Experiment (CYBEX)

This report details key concerns discussed during the JFAC/DAU/CSIAC Software Assurance (SwA) Cyber Experiment (CYBEX) on 7 August 2018. In addition to evaluating newly developed SwA guides for program managers and developers, the exchange included…

Defense Acquisition University Secure Systems Design Course Experiment

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) developed a course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team which was executed on 17-18 May 2017. The goal of this exercise was…

Wireless Wide Area Network (WWAN) Security

Over the past few years, the use of wireless data devices, such as the BlackBerry unit by Research In Motion (RIM), has greatly increased within the federal government. The need for accessing email remotely has…