The Cyber Edge Home Page

Active-duty, Reserve and National Guard service members participate in exercises sponsored by U.S. Cyber Command. On Friday, President Donald Trump elevated the command to a unified combatant command. Photo: Chief Petty Officer Dennis J. Herring, USN It’s Official: President Elevates U.S. Cyber Command

The move, announced on Friday, could be followed by the command's separation from the National Security Agency.

Cyber attacks in the United States usually pass though universities or susceptible third-party infrastructure, explains Kevin Mandia, CEO of FireEye, a cybersecurity company. Cyber Intrusions Linked to Global Geopolitics

It took 18 years of responding to breaches before FireEye CEO Kevin Mandia made the connection, the former Air Force computer security officer revealed at a recent conference.

Lt. Gen. Vincent R. Stewart, USMC, director, Defense Intelligence Agency, speaks at the Department of Defense Intelligence Information System 2017 Worldwide Conference. Cognitive Warfare Will Be Deciding Factor in Battle

Modern warfare is a cognitive battle. To be successful, warfare must strive to control information.


DoDIIS Conference Emphasizes Cybersecurity

Members of the Army National Guard, Air National Guard, Army Reserve and civilian agencies prepare to engage in cyber attacks as part of the recent Cyber Shield 17 exercise at Camp Williams, Utah. The cyberthreat’s borderless nature is bringing together experts from several nations at this year's Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference in St. Louis.

International military commanders, intelligence officials and industry executives will discuss threat response. 


New Cyber Research Service Available to Academia

Comodo's service, called Comodemia, provides users access to one of the world's largest cybersecurity data repositories.


Delivering the Network Warfighters Deserve

Maj. Gen. (P) Bruce Crawford, USA, the Army’s chief information officer/G-6, speaks at TechNet Augusta.

“We’re treating the network like a weapon system where every component must function as one seamless capability to increase lethality ... on the battlefield.” —Maj. Gen. Bruce Crawford, USA, Army CIO/G-6


Securing the Castle with Network Modernization

Panelists discuss network modernization at TechNet Augusta 2017.

Modernizing the network saves money, improves cybersecurity and benefits warfighters, Army officials say.


Army Confronts the Changing Face of War

Lt. Gen. Paul Nakasone, USA, commanding general, U.S. Army Cyber Command, speaks at TechNet Augusta 2017.

Future battlefields may include robots, AI, quantum computing and driverless convoys, as well as cyber and other game-changing capabilities.


U.S. Army Cyber Doctrine Making a Difference

The Army’s first doctrine for fighting in the cyberspace and electronic warfare domains already is changing the way the service operates.

Cyber Resources

Transforming Datacenter Operations at the Tactical Edge

The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure in ...

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions ...

Threat Hunting For Dummies, Carbon Black Special Edition

Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intr ...

The Cyber Edge - April 2017

The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M ...

Cybersecurity - A Strategic Problem

Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a ...

Key Cyber Issues and Recommendations: A Way Forward

Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve ...

Feds: You have a BYOD program whether you like it or not

Many agencies believe they aren't actually subject to cyber-threats from mobile devices because, simply, they don't currently allow personal mobile devices to access their networks. Ultimately, howeve ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!