The Cyber Edge Home Page

1
2
3

Joint Force Looks For a Leg Up In Cyberspace

The U.S. Army Cyber Command’s 41 Cyber Mission Force teams, including the 780th Military Intelligence Brigade operations center at Fort Meade, Maryland, achieved full operational capability more than a year ahead of schedule. Credit: Steve Stover

Cyberthreats constantly grow in volume, velocity and sophistication, and the force needs a warfighting platform that will allow it to get ahead of attackers.

 

How to Checkmate IoT Attacks

One way international military and government agencies gather information about weather and oceanographic data to enhance forecasting and environmental models is through networked buoys. The Royal Danish Air Force deployed these ice-hardened buoys from a C-130 into the Arctic Ocean in September as part of the International Arctic Buoy Program. Credit: John F. Williams

The Internet of Things emerges as a highly sought-after technology advantage, and the federal government has stepped up as an innovator.

 

This Team Is a Lean, Mean Cyber Crime-Fighting Machine

The Czech army examines the dynamics within social groups using a technique called sociomapping, which helps analyze an adversary’s team member relationships and applies to offensive cybersecurity team building.

Modern information and networking technologies increase independence and save time.

 

Are You Ready for DOD's New Mandate?

Federal contractors need to be able to show by January 1 they have a plan in place to meet NIST’s new cybersecurity mandate. Credit: geralt/Pixabay

 A DOD mandate requires private sector companies to follow a set of cybersecurity best practices.

 

AI Should Not Replace Tried-and-True Security Practices

Artificial intelligence is helping to solve many problems, but humans remain a crucial element for cybersecurity. Credit: GDJ/Pixabay

AI alleviates many challenges, but humans remain critical to cybersecurity.

 

DHS Helps Secure First Responder Apps

A DHS pilot project has secure mobile apps used by first responders. Credit: geralt/Pixabay

The Securing Mobile Applications for First Responders pilot project discovered potential security and privacy concerns.




Cyber Resources

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee

This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve pr ...
 

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee

This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve pr ...
 

It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management

Your approach to vulnerability management may be putting your organization at greater risk. Just dealing with vulnerabilities that a vendor said were "critical" isn't enough and may still leave you su ...
 

Transforming Datacenter Operations at the Tactical Edge

The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure in ...
 

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions ...
 

Threat Hunting For Dummies, Carbon Black Special Edition

Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intr ...
 

The Cyber Edge - April 2017

The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!