The Cyber Edge Home Page

1
2
3

DHS Tackles Emergency Communications Interoperability

A mobile intensive care unit paramedic communicates using a land mobile radio. The U.S. Department of Homeland Security (DHS) is working with the full spectrum of emergency responders to improve communications interoperability during disaster events.

Even as new technologies are introduced, the focus remains on human training.

 

Cyber Resiliency a Feather in CROWS' Flight Cap

The KC-135 Stratotanker was originally used to support bombers of the Strategic Air Command. The midair refueling capabilities of the KC-135 allow fighters to spend hours instead of minutes on the front lines. The Stratotanker is one of the first weapon systems to be evaluated for cyber resiliency under the Air Force’s new methodology. Credit: Air Force

The U.S. Air Force is developing a methodology for assessing the cyber resiliency of weapon systems and examining how to standardize it across the service.

 

Hands-Off Weaponry Requires Hands-On Planning

The Uran-9 unmanned ground combat vehicle took part in the 2018 Moscow Victory Day Parade on Red Square earlier this year. Credit: Dianov Boris/Shutterstock.com

Governments, militaries and research groups are taking cyber capabilities one step further.

 

Latest Leakers Are Canaries in Coal Mine

The millennial generation came of age when the ability to share information via technology was just beginning. Without guidelines, many began to share everything without regard of the consequences to themselves or others. Credit: GaudiLab/Shutterstock

The recent dissemination of classified information through media outlets and social media indicate that insider threat management has entered a new phase.

 

Unified Platform Unifies Cyber Warfighting

Rear Adm. Timothy White, USN, commander, Cyber National Mission Force, U.S. Cyber Command, shares feedback with students attending the Joint Cyber Analysis course at the Information Warfare Training Command (IWTC), Corry Station, Pensacola, Florida. The Unified Platform will assist members of all services in securing networks by enabling cyber warriors to prosecute full-spectrum cyberspace operations. Credit: Glenn Sircy/Center for Information Warfare Training Public Affairs

The U.S. Defense Department is investing in capabilities that equip U.S. cyber forces with a warfighting platform to achieve and defend cyberspace superiority.

 

Three Steps to Prepare for IoT and Edge Computing

Edge computing and the Internet of Things have the potential to enhance government agility and efficiency. Shutterstock

 The federal government has just begun implementing the IoT and edge computing with true adoption being hampered by security concerns.




Cyber Resources

Building a Culture of Cybersecurity: A Guide for Corporate Executives and Board Members

According to the World Economic Forum, a majority of business leaders indicated that cyberattacks are their top concern heading into 2018. For many organizations, there needs to be an important shift ...
 

Deep Knowledge: How IMPRES Technology Helps Government Customers

Information technology contracting in the federal government can be challenging work. Companies must balance between helping agencies meet their program goals while also meeting government requirement ...
 

Is Your Investment in Cybersecurity Training Paying Off?

The modern world takes place in a largely digital space. Underneath the physical assets that drive our businesses are mountains of data and personal information. The digitizing of information has had ...
 

Cyber Threat Intelligence: Moving cyber security to the heart of our business

Cyber Threat Intelligence (CTI) is a collection of data points (e.g. Open source, Social media, Human, Deep Web) and ultimately boils down to three questions:
- What do you have of value or import ...
 

Solving the Cybersecurity Challenges of Federal Agencies

Managing today's network infrastructures can present challenges for federal agency IT leaders-from demands for higher performance,
to compliance with new standards and regulations, to integrating e ...
 

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee

This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve pr ...
 

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee

This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve pr ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.