The Cyber Edge Home Page

1
2
3

Laying the Approach for Future Air Force Operations

U.S. Air Force Airmen prepare an F-22 Raptor for takeoff at Joint Base Langley-Eustis, Virginia, in September. The Air Combat Command is taking steps to ready the Air Force for multidomain operations.  U.S. Air Force photo by Airman 1st Class Sarah Dowe

On the battlefield of the future, warfighters will need to be extraordinarily interconnected to weapon systems in the air, sea, space, land and digital realms.

 

Internet of Things Invasion

The 348th Engineer Battalion prepares for mobilization at the Total Force Training Center, Fort McCoy, Wisconsin, in late May. Experts share that sensors and other Internet of Things devices will be able to be placed everywhere—in concrete, glass or fabrics, for example. Credit: Russell Gamache

As the number of electronic devices connected to the Internet grows, so does the security risk and the chance of data exfiltration by adversaries.

 

Incoming: Multidomain Operations and What Innovation Means for the Future of Warfare

The multidomain operations concept envisions future wars being executed extremely fast and incorporating a great deal of automation and networking to connect sensors to warfighters across all domains—land, air, sea, space and cyber. Credit: Gorodenkoff/Shutterstock

As the Defense Department moves to embrace more innovation, it will change the way our future wars will be fought.

 

Crackdown on Supply Chain Cybersecurity

Recent events indicate the government is serious about enforcing supply chain cybersecurity. Credit: Kalabi Yau/Shutterstock

 Contractors doing business with the government and/or their suppliers need to know how the latest push for enforcement will impact them.

 

DISA Begins Implementing Fourth Estate Initiative

DISA is beginning to implement plans to build a common network infrastructure for 14 defense agencies known as the “fourth estate.” The effort could save hundreds of millions of dollars over the long term. Credit: ktsdesign/Shutterstock

DISA's Fourth Estate Network Optimization (4ENO) Initiative moves to the initial implementation phase and could save hundreds of millions of dollars over the lifetime of the program.

 

NSA Creates Cybersecurity Directorate

The NSA's new Cybersecurity Directorate will initially focus on securing weapon systems and the defense industrial base. Credit: Shutterstock/honglouwawa

The organization will help secure weapon systems and the defense industry.




Cyber Resources

Will Your Security Solution Fit the New CMMC Framework?

The Cybersecurity Maturity Model Certification (CMMC) promises to have significant impact on the state of cybersecurity requirements for US DIB contractors. Each member of the DIB supply chain plays a ...
 

NIST: 800-160(2) and 800-171(B) Securing High Value Assets and Confidential Unclassified Information

The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respective ...
 

Signal Cyber Edge October 2019

Cyber policy traditionally has focused more on enterprise networks than tactical systems, according to Nancy Kreidler, the Army's new leader for the Cybersecurity and Information Assurance Directorate ...
 

Cyber Insurance

The Cyber Insurance Subcommittee of AFCEA International's Cyber Committee concluded cyber insurance is useful in risk transference but with some important caveats. For example, a purchase decision is ...
 

Signal Cyber Edge July 2019

The whole is greater than the sum of its parts when the two combine forces for information technology. BY ROBERT K. ACKERMAN

The U.S. Army is building a tighter relationship with industry to t ...
 

Why UEM is the key to enterprise IT security?

Free e-book that aids in improving your enterprise IT security
Most IT admins have asked themselves at some point in time, "How do I achieve and sustain enterprise IT security?"

With cybercr ...
 

Cyber Deception: How to Build a Program

With traditional cybersecurity, companies play a cat-and-mouse game to identify, block, and prevent threats. A deception program changes this by giving defenders the ability to learn about attackers i ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.