The Cyber Edge Home Page

New DISA Program Assesses Operational Risk

As DISA knows, a network that complies with standards still is not necessarily secure.

New technologies selected by the DHS will be introduced to cybersecurity professionals through a series of Demonstration Day events taking place around the country. Cyber Techs Ready for Prime Time

A DHS program unveils eight new cybersecurity technologies with commercial potential to investors, developers and integrators.

Experts: WannaCry Ransomware Is Just the Beginning

The crippling ransomware attack that paralyzed hospitals, universities and businesses globally was just a cyber vulnerability appetizer, experts warn.

1
2
3

Trump Signs Long-Awaited Cyber Executive Order

White House homeland security adviser, Thomas Bossert, announces details of the White House’s long-awaited cybersecurity executive order, which President Donald Trump signed May 11.

President Donald Trump on Thursday signed the much-anticipated cybersecurity executive order to strengthen federal networks.

 

Industry Off and Running in ODNI Xpress Challenge

The home page of the ODNI’s Xpress challenge serves both as an information resource about the competition and a portal for potential entrants. Organizations are able to register to compete right up to the end of the contest on July 5.

Companies, organizations and academic institutions are vying to develop machine analytics tools for the intelligence community in an open competition.

 

USCG Makes 'Significant' Move to Operationalize Cyber

 U.S. Coast Guard Academy cadets discuss strategy during a 2016 Cyber Defense Exercise, a competition between service academies conducted by the National Security Agency. U.S. Coast Guard photo by Petty Officer 2nd Class Richard Brahm, USCG

Technological development has transformed U.S. Coast Guard networks into warfighting platforms as the service operates in a dramatically different realm.

 

Beyond Plan B: Army Embraces Broad Cyber Program

U.S. soldiers conduct cyberspace operations during a training rotation last January at the National Training Center at Fort Irwin, California. They are among several cyber organizations taking part in pilot programs to help the Army develop how it will build and employ cyber in its tactical formations.

The Defense Department's research arm skipped from Plan B for cyber defense solutions to Plan X, advancing platforms to conduct cyber warfare like kinetic warfare.

 

Intelligence Threats Increase in Complexity

The late Hugh Montgomery, a former ambassador who retired from the CIA in 2014 after serving the intelligence community for more than six decades, displays photographs from his younger days.

It's just a matter of time before other countries face insider leaks similar to those that have haunted the American intelligence community, said Hugh Montgomery.

 

New Army Cyber Task Force Does Deep-Dive Review

The Army’s newest Task Force Cyber Strong hit the ground running this week to strategically assess its cyber needs, strengths, weaknesses and assets.




Cyber Resources

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions ...
 

Threat Hunting For Dummies, Carbon Black Special Edition

Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intr ...
 

The Cyber Edge - April 2017

The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M ...
 

Cybersecurity - A Strategic Problem

Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a ...
 

Key Cyber Issues and Recommendations: A Way Forward

Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve ...
 

Feds: You have a BYOD program whether you like it or not

Many agencies believe they aren't actually subject to cyber-threats from mobile devices because, simply, they don't currently allow personal mobile devices to access their networks. Ultimately, howeve ...
 

Public/Private Information Sharing

This white paper captures some areas of great interest to the cyber community as represented by our sample of interviewees. There is no shortage of practical and achievable process improvement ideas. ...
 

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!