Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

AFRL Announces Airlift Challenge, AI-Based Planning Competition

The U.S. Air Force Research Laboratory, or AFRL, will host an Airlift Challenge competition from January 23 through February 27,…

NIST Retires SHA-1 Cryptographic Algorithm

The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its…

NSA Publishes 2022 Cybersecurity Year in Review

The National Security Agency (NSA) published its 2022 Cybersecurity Year in Review to share its mission focuses and demonstrate how…

Partnering With Ukraine on Cybersecurity Paid Off, Leaders Say

A year ago, a hunt-forward 10-member team of the U.S. Cyber Command’s Cyber National Mission Force arrived in Kyiv, Ukraine….

Connecting Warfighters at the Edge With a RIPL

ROME, N.Y. (AFRL) — The U.S. Air Force Research Laboratory, or AFRL, demonstrated its robust information provisioning layer, or RIPL,…

U.S. Cyber Command, DARPA Initiate Rapid Cyber Capability Prototyping and Integration Pilot

The United States Cyber Command (CYBERCOM) and DARPA are kicking off a pilot program aimed at getting new cyber capabilities…

NIST Finds a Sweet New Way to Print Microchip Patterns on Curvy Surfaces

NIST scientist Gary Zabow had never intended to use candy in his lab. It was only as a last resort…

CISA Reminds Online Shoppers to Stay Vigilant

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) is committed to helping Americans stay safe online this holiday season….

Cybersecurity Speaker Series: 5G Security Impacts National Security

FORT MEADE, Md. — The National Security Agency (NSA) Cybersecurity Collaboration Center released the latest video in its Cybersecurity Speaker…

Sandia Studies Vulnerabilities of Electric Vehicle Charging Infrastructure

ALBUQUERQUE, N.M. — With electric vehicles becoming more common, the risks and hazards of a cyberattack on electric vehicle charging…

Cyber Operations Enabling Expansive Digital Authoritarianism

As part of its ongoing transparency efforts to enhance public understanding of the intelligence community’s (IC) work and provide insights…

Entering a New Phase: NIST Technique Simultaneously Locates Multiple Defects on Microchip Circuits

Defective computer chips are the bane of the semiconductor industry. Even a seemingly minor flaw in a chip packed with…