Empowering Security and Innovation:
Strengthening Defense through
Cyber and Tech Expertise

The Dakota State Applied Research Corporation (DARC) is a dynamic research entity advancing cutting-edge solutions in cybersecurity, technology, and digital innovation. Leveraging expertise of skilled researchers and industry professionals, DARC engages in collaborative projects, applied research, and technology development initiatives to address real-world challenges faced by businesses, government entities, and communities.

  • Software Development
  • Malware Analysis
  • Cyber Security

Andrea Thompson named CEO of DSU Applied Research Corporation

Thompson is a South Dakota native with a long career in national security, foreign policy, intelligence, cyber and emerging technology, and strategic policy which includes serving over 25 years as an Army intelligence officer, including tours in Iraq and Afghanistan, serving as the Deputy Assistant to the President and National Security Advisor to the Vice President of the U.S., Under Secretary of State for Arms Control and International Security, and VP of International Programs at Northop Grumman.

$90 million Investment

The cyber-research initiative leverages public/private partnerships to create an environment that will stimulate a vibrant cyber-research industry in South Dakota. Researchers at the DSU Applied Research Corporation locations in Madison and soon Sioux Falls will work to support national security and defense, offer workforce and economic development opportunities, and establish South Dakota as a cyber state.

Cyber Bootcamps

Intensive and immersive training programs designed to rapidly equip individuals with practical skills and knowledge in cybersecurity through hands-on exercises and real-world simulations, led by experienced professionals.

Services

  • Software Development

    Software development services offered at DARC encompass the end-to-end process of creating, designing, coding, testing, and deploying applications to meet specific functional requirements. Our skilled software developers collaborate with clients to understand their needs, and then employ programming languages, frameworks, and methodologies to craft tailored solutions. Throughout the development lifecycle, these services involve rigorous quality assurance and testing to ensure the software's reliability, security, and optimal performance, ultimately delivering innovative and user-centric digital products for various industries and purposes.

  • MALWARE ANALYSIS

    Malware analysis services involve the comprehensive examination of malicious software to understand its functionality, behavior, and potential impact on systems and networks. Skilled cybersecurity professionals utilize specialized tools and techniques to dissect the code, identify the malware's purpose, and determine its attack vectors, including infection methods and communication channels. By unraveling the intricacies of malware, these services help organizations assess the extent of the threat, develop effective mitigation strategies, and enhance their overall cybersecurity posture.

  • Digital Forensics

    Digital forensics services encompass the systematic investigation and analysis of electronic devices, digital data, and networks to uncover and preserve evidence of cybercrimes, security breaches, or unauthorized activities. Through specialized tools and methodologies, trained experts meticulously collect, preserve, and analyze digital artifacts, such as files, metadata, and communication logs, while maintaining the integrity of the original data. This process aids in reconstructing events, identifying perpetrators, and providing crucial insights for legal proceedings or mitigation strategies, bolstering the ability of organizations and law enforcement agencies to effectively respond to and prevent digital threats.

  • Cybersecurity

    Cybersecurity services involve a comprehensive suite of practices and solutions dedicated to protecting digital assets, systems, and networks from an evolving landscape of cyber threats. Through a combination of proactive measures, threat detection, vulnerability assessments, and incident response, these services aim to prevent unauthorized access, data breaches, and disruptions to digital operations. Cybersecurity experts utilize cutting-edge technologies, best practices, and continuous monitoring to identify vulnerabilities, mitigate risks, and ensure the confidentiality, integrity, and availability of critical information, bolstering organizations' resilience against a wide range of cyberattacks and ensuring a secure digital environment.

  • Workforce Development

    Encompasses a range of tailored programs and resources designed to build and enhance the skills of individuals in the field of cybersecurity. These services provide comprehensive training, hands-on workshops, and certifications that align with industry standards, enabling participants to effectively combat cyber threats and contribute to the overall security of organizations. By bridging the skills gap and fostering a qualified workforce, cyber workforce development services play a vital role in addressing the ever-growing demand for skilled cybersecurity professionals.

  • Penetration Testing

    Penetration testing services provide organizations with a systematic and controlled approach to evaluating the security of their digital systems, networks, and applications. Skilled cybersecurity experts simulate real-world cyberattacks to uncover vulnerabilities, weaknesses, and potential entry points that malicious actors could exploit. By conducting these ethical hacking exercises, penetration testing services assist in identifying security gaps, assessing the effectiveness of existing defenses, and offering actionable insights for improving overall cybersecurity. These services play a crucial role in helping organizations proactively identify and address potential risks, thereby fortifying their security measures and ensuring a resilient defense against evolving cyber threats.