The Cyber Edge Home Page

1
2
3

Prepare National Security Systems Now for Quantum Threats

With the National Institute of Standards and Technology expected next year to select quantum-resistant algorithms for encryption and for digital signatures, an NSA official warns that departments and agencies should begin preparing now to protect national security systems in the quantum era. Credit: sakkmesterke/Shutterstock

The national security community needs to prepare now for the possibility that U.S. adversaries could be first to develop and deploy quantum computers.

 

Flexible Consistency Improves Information Security

Training sessions, such as Cyber Shield 19, provide cybersecurity analysts opportunities to train, exchange best practices and test their cyber mettle. Credit: Army Staff Sgt. George B. Davis

The nature of military permanent change of station assignments can create gaps in the U.S. Defense Department’s protected posture to cyber assets.

 

Up-Tempo Technology Progress Shifts Power Balance

The NATO Ministers of Defence meet in February to prepare for its summit later this year. Among the topics socially distanced attendees discussed were progress on burden sharing and missions in Afghanistan and Iraq. Credit: NATO

NATO is at risk of losing its technology edge because of emerging and disruptive technologies increasingly developed within the civil sector.

 

The Other Side of Zero Trust

Senior Airman Rose Li, USAF (l), and Airman 1st Class Eric Gardella, USAF, 86th Communications Squadron wing cyber readiness technicians, monitor malicious network activity during exercise Tacet Venari at Ramstein Air Base, Germany, in 2020 to prepare local cyber defenders in safeguarding critical technological infrastructures. U.S. Air Force photo by Staff Sgt. Devin Boyer

The more important aspect of zero trust relates to application and workload connections, which is what attackers care about and is not being protected today.

 

U.S. Cyber Command Saw 'Unique' Challenges in 2020

Adversaries are no longer merely launching attacks from their part of the world, says Gen. Paul Nakasone, USA, commander, U.S. Cyber Command, testifying before Congress on March 25. “They can come in the United States and use our infrastructure, and there is a blind spot for us not being able to see them,” he warns.

The command’s leader reports no compromise of DOD information networks from SolarWinds breach.

 

China Posing Power Challenge

China’s consolidated control its political mechanisms enables a unity of effort difficult to achieve in democracies. Credit: Shutterstock/Poring Studio

As China has modernized and gained strength, it appears to have sought mechanisms by which it can shape the international system and tools that afford it unique influence and privileges equal to—and perhaps surpassing—those of the United States.




Cyber Resources

The Cyber Edge April 2021

The national security community needs to prepare
now for the possibility that U.S. adversaries could
be first to develop and deploy quantum computers, which would render useless most conventiona ...
 

Zero Trust Architecture

Zero trust architecture is a cybersecurity concept that assumes a network is or will be compromised and takes steps to protect data at every potential point of access. But such a move, while very bene ...
 

Packet Capture is a Foundational Technology for Cyber Security

As distributed applications and cloud services have become commonplace, the increased complexity in network and application architectures has made it challenging for teams to ensure the reliability, p ...
 

Merging Security Layers Aid DOD Cloud Security

As the U.S. government migrates to cloud-centric networks, the need to protect them from rapidly evolving cyber threats increases. This shifting environment presents Defense Department planners with s ...
 

Getting Left of Boom: How to Defeat Ransomware and Other Cyber Threats

There is a virulent plague spreading across the globe, Homeland Security Secretary Alejandro Mayorkas warned earlier this year. But he wasn't talking about COVID-19. Instead, he was referring to what ...
 

Achieving Multidomain Operations through Virtualization

The U.S. Department of Defense is returning to a command-and-control concept embracing joint and allied operations with the added domains of space and cyberspace adding to the mission space. But while ...
 

Cybersecurity Embraces the New Normal

The COVID-19 pandemic has forced federal agencies and private businesses around the world to adapt to a new reality, one where most of their employees now work remotely and communicate virtually. This ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.