Coming Soon: A New CSIAC.org
Community

Coming Soon: A New CSIAC.org

Protecting Controlled Unclassified Information
Webinar

Protecting Controlled Unclassified Information

NIST’s latest publication released in August 2015 provides direction on implementing an information assurance framework for Non-federal information systems. This is important as there are a few new DoD designators for ...

Free Publications Now Available at the CSIAC Store!
Product

Free Publications Now Available at the CSIAC Store!

Visit the CSIAC store to view all the products available including FREE publications!

  1. Newest Content
  2. Popular Today
  3. Recent Discussion
  4. Most Commented
  • CSIAC Admin
    SDTATIC Has Been Discontinued - 10 views(s) today
    06/30/2014 - 9:52am by CSIAC Admin
    The Software Development Tools and Technology Information Clearinghouse (SDTATIC) has been discontinued.  CSIAC appreciates the support of the vendors who provided product information for...
  • CSIAC
    Vulnerability Assessment - 7 views(s) today
    02/04/2013 - 11:23am by CSIAC
    (Distribution A - Unlimited) This Cyber Security and Information Systems Information Analysis Center (CSIAC) tools report (Sixth Edition) provides an index of Intrusion Detection System (IDS)...
  • CSIAC Admin
    SWMR Has Been Discontinued - 6 views(s) today
    04/20/2015 - 11:45am by CSIAC Admin
    As of April 20th 2015 the SoftWare Model Repository (SWMR) has been discontinued.If you have any questions, please send an email to info@csiac.org.
  • CSIAC Admin
    IDS - 5 views(s) today
    11/18/2014 - 1:49pm by CSIAC Admin
    Intrusion Detection System
  • amacdiarmid
    01/21/2013 - 4:00pm by amacdiarmid
    The Certified Information Privacy Professional/Information Technology (CIPP/IT) is the first global privacy certification for IT practitioners. It assesses understanding of privacy and data...
  • CSIAC Admin
    10/25/2013 - 9:19am by CSIAC Admin
    1. Abstract: Mobile network operators (MNOs) must grapple with complex security management in fourth generation Long Term Evolution (4G LTE) deployments. The security architecture of 4G LTE may...