A Proven Resource for Maximizing DoD Dollars

A Proven Resource for Maximizing DoD Dollars

The DoD Information Analysis Centers (IACs) serve as an essential resource to affordably deliver technical data and analyses in support of current operations. The Pentagon has recognized the DoD IACs' ability to maximize ...

DISA reorganization highlights Cybersecurity
Best Practice/Reference Document

DISA reorganization highlights Cybersecurity

Latest re-org and reassignment of responsibilities.

CSIAC Journal Call for Papers

CSIAC Journal Call for Papers

CSIAC is looking for Cybersecurity-related technical research papers. We are especially interested in papers which address the following topics:

  • Cybersecurity of Critical Infrastructure and Installation ...
  1. Popular Today
  2. Newest Content
  3. Recent Discussion
  4. Most Commented
    Cybersecurity - 22 views(s) today
    07/11/2012 - 8:15am by CSIAC
    Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and...
  • showard
    06/21/2013 - 10:32am by showard
    The advent and evolution of the Smart Grid initiative to improve the electric utility power infrastructure has brought with it a number of opportunities for improving efficiencies, but along with...
  • plein
    DoD IA Policy Chart - 11 views(s) today
    02/14/2013 - 10:26am by plein
    Building, operating and securing the Global Information Grid (GIG) for the Department of Defense is a complex and ongoing challenge. The Deputy Assistant Secretary of Defense (DASD) for Cyber...
  • ariesbeck
    DTIC's R&E Gateway - 10 views(s) today
    10/31/2013 - 4:18pm by ariesbeck
    R&E Gateway offers a secure, collaborative environment in which DoD and industry partners (even if separated by geography, time or organization) can access a wide range of information and...
  • CSIAC Admin
    Information Assurance - 10 views(s) today
    02/03/2015 - 5:16pm by CSIAC Admin
  • showard
    10/25/2013 - 9:19am by showard
    1. Abstract: Mobile network operators (MNOs) must grapple with complex security management in fourth generation Long Term Evolution (4G LTE) deployments. The security architecture of 4G LTE may...