The Cyber Edge Home Page

1
2
3

Speed of Cyber Is Not Always in Milliseconds

Soldiers from the 25th Infantry Division in Hawaii and from U.S. Army Training and Doctrine Command Centers of Excellence participate in the Army's Cyber Blitz in April 2016 at Joint Base McGuire-Dix-Lakehurst, New Jersey. Cyber Blitz provides the Army a way to learn about cyber and electromagnetic activity. U.S. Army CERDEC photo by Kristen Kushiyama

Among the lessons learned from the U.S. Army’s Cyber Blitz: Cyber operations do not always occur in fractions of seconds.

 

Dana Deasy Drives Toward Digital Modernization

After getting a call from the White House, Dana Deasy came out of retirement to become the chief information officer for the U.S. Department of Defense.

Cybersecurity, cloud computing, AI, and command, control and communications (C3) are the four pillars of digital modernization.

 

Enabling Spectrum-Based Operations in a Cyber World

Staff Sgt. Kristoffer Perez, USA, Cyber Electromagnetic Activities section, 1st Armored Brigade Combat Team, 1st Infantry Division, carries a dismounted electronic warfare kit that allows him to work in concert with the rest of his section. To get inside an enemy’s OODA loop, commanders will need a way to see how electronic warfare is affecting the battlespace. Photo by Sgt. Michael C. Roach, 19th Public Affairs Detachment

Improving temporal, spectral and information understanding within the layers of the cyber domain could facilitate useful cyber-spectral and information maneuver.

 

The Future of the Command Post

Maj. Matthew Bailey, USA, executive officer, 3rd Squadron, 2d Cavalry Regiment (3/2CR), and 1st Lt. Trevor Rubel, USA, battle captain for the tactical command post, 3/2CR, review an operational overlay on a Nett Warrior device in preparation for an airfield seizure during the NATO Saber Strike 18 exercise in Kazlu Ruda, Lithuania. U.S. Army photo by 1st Lt. Joshua Snell

Technologies are spawning a revolutionary improvement in C2 that will have a transformative impact on how it is conducted at the operational level.

 

Agile Integration Connects Continents

The worldwide regional hub nodes, including in the Pacific, are the largest satellite transport nodes of the Army’s tactical communications network, Warfighter Information Network-Tactical (WIN-T), enabling robust network communication exchange in, out and within theater. U.S. Army photo by Liana Mayo, PAO 311th Signal Command

Future U.S. Army regionally aligned forces will benefit from experiences discovered during last year’s integration with the U.S. Army Europe comms network.

 

U.S. Navy Programs Shore Up Cybersecurity

The USS Carney transits the Mediterranean Sea on patrol. The diverse nature of U.S. Navy ship systems presents a service-unique challenge to cybersecurity efforts as the Navy modernizes its information technologies. Credit: U.S. Navy photography by Mass Communications Spec. 1st Class Ryan U. Kledzik, USN

The Navy faces the dual challenge of incorporating new architectures and technologies such as AI and machine learning amid increasingly sophisticated adversaries.




Cyber Resources

BIG DATA STRATEGIES: Protecting Information from Theft and Tampering

Cybercriminals have long profited by selling stolen financial and personal data. Of late, they've added another alarming technique: encrypting an organization's data where it's stored and demanding pa ...
 

Building Cyber Resilient Technologies

For a computing paradigm, "Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation". Resilience is related to survivab ...
 

The Key to Beating Perpetual Cyberattacks

The cyber domain is like any other military or intelligence theater of operations: Success requires highly skilled, well-trained and experienced professionals.

Technology in the form of advance ...
 

Today’s Insider Threat – It’s Real!

As commercial corporations and government agencies continue to spend countless millions of dollars on protecting their most valued asset (data) from outside cyber-attacks and ever so increasing inside ...
 

TechNet Augusta 2018 Solutions Showcase Compendium

As part of TechNet Augusta 2018, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the cyber electromagnetic ...
 

Securing Government Desktops from Cyber Threats with the Latest KVM Technology

Foreign nations, terrorists, and cyber criminals see state and local government IT infrastructure as an extremely attractive target for data theft, attacks, and disruption. Attacks have taken down ent ...
 

Building a Culture of Cybersecurity: A Guide for Corporate Executives and Board Members

According to the World Economic Forum, a majority of business leaders indicated that cyberattacks are their top concern heading into 2018. For many organizations, there needs to be an important shift ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.