The Cyber Edge Home Page

1
2
3

Will Artificial Intelligence Steal Your Fingerprints?

Some fingerprint authentication systems, such as those on mobile devices, use only a partial print that is not as unique as an entire print and leaves the technology vulnerable to a synthetic fingerprint hack.  Shutterstock

Some people worry that AI will steal their jobs, but machine learning algorithms now generate images of fake fingerprints that match the prints of one in five people on the planet.

 

Kinetic Weapons Remain a Priority as Cyber War Rages

Leaders for all three maritime services—the Navy, Marines and Coast Guard—participate in a town hall forum at West 2019. Photo by Michael Carpenter

Cyber war may be raging, but the maritime services balance cyber and kinetic priorities.

 

U.S. in Counter-Attack Mode in Cyber Domain

A West 2019 panel discusses combat operations in the cyber realm. Photo by Michael Carpenter

The United States is fully engaged in combat operations in the cyber realm, according to a panel of military officials at the AFCEA-USNI West conference.

 

A Banner Year for Cyber Implementation

Brig. Gen. Dennis Crall, USMC, deputy principal cyber advisor, Office of the Secretary of Defense, speaks at the National Security Technology Forum and Exposition in San Diego. Photo by Michael Carpenter

The U.S. Defense Department is poised to implement its cybersecurity strategy focusing on near-term priorities such as endpoint management, network visibility, user authentication and cyber force development.

 

Reactions to Cloud Strategy Only Partly Sunny

Industry and military officials see both silver linings and gray skies in the Pentagon's cloud computing strategy. Credit: Ivan Cholakov and jannoon0281/Shutterstock, edited by Chris D'Elia

Military and industry experts praise the Defense Department's cloud computing strategy as an important first step toward modernization while raising concerns and questions.

 

The Navy Turns a Sharper Eye Toward Information Warfare

Two U.S. Navy sailors monitor data onboard the USS Jason Dunham during a 6th Fleet area operation. The Naval Information Forces command is consolidating information warfare activities and training to standardize all aspects of the domain across the Navy. U.S. Navy photo

The U.S. Navy is consolidating its information warfare efforts to ensure effective operations across the breadth of the fleet and its ashore assets.




Cyber Resources

Attivo Networks® ThreatDefend™ Platform and the MITRE ATT&CK Matrix

The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Matrix provides a model for cyber
adversary behavior, reflecting various phases of an adversary's lifecycle and ...
 

AFCEA 2019 Army Signal Conference Solutions Showcase

2019 AFCEA Army Signal Conference Solutions Showcase Compendium
Prior to the conference, the U.S. Army identified opportunities for industry to offer potential solutions to problems the service and ...
 

Intelsat-29e Interference Mitigation Testing

Cyber threats are growing more advanced, with networks constantly under attack from entities in search of critical data to deny transmission or steal information. Intelsat EpicNG delivers reliability, ...
 

2018 Trends in Cybersecurity: Building Effective Security Teams

As cybersecurity has become more complex, traditional methods do not account for the wide range of issues related to securing corporate data and handling privacy concerns. New technology, improved pro ...
 

Turning Data into a Strategic Asset for the Warfighter

Federal agencies increasingly need data-derived insights to address complex challenges, deliver mission success, and optimize resources for maximum effectiveness and efficiency. Whether the challenge ...
 

BIG DATA STRATEGIES: Protecting Information from Theft and Tampering

Cybercriminals have long profited by selling stolen financial and personal data. Of late, they've added another alarming technique: encrypting an organization's data where it's stored and demanding pa ...
 

Building Cyber Resilient Technologies

For a computing paradigm, "Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation". Resilience is related to survivab ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.