The Cyber Edge Home Page

More Than Just Your Regular Cyberthreats

A classified event is nothing short of interesting. A classified cyber forum is nothing short of mandatory.  

U.S. Army Chief of Staff Gen. Mark A. Milley, USA, visits soldiers serving with the cyber electromagnetic activities (CEMA) support to corps and below (CSCB) team, 780th Military Intelligence Brigade, in May at the National Training Center in Fort Irwin, California. Photo by Sgt. 1st Class Chuck Burden, USA Army Accelerates Cyber, EW Integration

U.S. Army puts its organizational architecture on the line, prioritizing the newest warfighting domain while converging it with re-emerging combat disciplines.

How the Hashtag Is Changing Warfare

Bots are used to manipulate opinions and advance agendas, and identifying, countering and degrading bot armies requires new tactics—battle-ready tactics.

1
2
3

Man and Machine Marry to Fight Cyber Attacks

The CONUS Defense Department environment shares data and information amid complex networking. A secure and effective environment could be ensured using an approach known as Digital Network Architecture, or DNA.

Highly skilled cyber analysts play an important role, but to achieve peak performance from both human and machine, automation within the network is needed.

 

Military SSDs Are MVPs of Data Storage

The use of COTS SSDs in defense applications comes down to trust. Are these storage devices rugged and secure enough to meet military application challenges?

 

Wanted: Top Technology, Talent for Federal Cyber

Lt. Gen. Alan Lynn, USA, director of DISA and commander of the JFHQ-DODIN, speaks at AFCEA’s Defensive Cyber Operations Symposium in June. Photo by Mike Carpenter

Conquering cyberthreats that pose a national security risk means acquiring cutting-edge technology and leading-edge talent and pairing them.

 

New Ransomware Attack Targets Europe, U.S. Bracing

Cyber experts in the United States are bracing for the effects of a massive cyber attack hitting Ukraine, primarily, and other European nations Tuesday.

 

Tech Support Scams on the Rise

Only about 15 percent of U.S. Internet fraud victims report the crimes to law enforcement.

Victims report being scammed out of nearly $8 million in 2016.

 

Getting Processors to Speak a Unified Cyber Tongue

Students in a Virginia Tech laboratory test Popcorn Linux, an operating system that can compile different programming languages into a single cyber tongue. The research is a collaborative effort between the university and the Office of Naval Research. Photo courtesy Binoy Ravindran

A government-academia collaboration has researchers working to streamline different computer programming languages so that processors can speak in a single cyber tongue.




Cyber Resources

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions ...
 

Threat Hunting For Dummies, Carbon Black Special Edition

Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intr ...
 

The Cyber Edge - April 2017

The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M ...
 

Cybersecurity - A Strategic Problem

Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a ...
 

Key Cyber Issues and Recommendations: A Way Forward

Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve ...
 

Feds: You have a BYOD program whether you like it or not

Many agencies believe they aren't actually subject to cyber-threats from mobile devices because, simply, they don't currently allow personal mobile devices to access their networks. Ultimately, howeve ...
 

Public/Private Information Sharing

This white paper captures some areas of great interest to the cyber community as represented by our sample of interviewees. There is no shortage of practical and achievable process improvement ideas. ...
 

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!