The Cyber Edge Home Page

1
2
3

From AI Hype to AI Proof

A soldier wears virtual reality glasses; a graphic depiction of a chess set sits in the foreground.  Illustration created by NIWC Pacific

AI promises to be an important predictive tool in the decision-making necessary for effective cyber warfighting, but the overheated hype has become a detriment.

 

Defending the Digital Human Network

The vastly complex and subtle digital human network that spans civilian and military populations must be defended as rigorously as computer networks.  Shutterstock/Pop Tika

The U.S. must make a deliberate decision to defend the digital human attack surface effectively by blurring traditional battle lines.

 

Precision-Guided Marketing Frames the Future of Information Operations

Defending digital ecosystems from information pollution data operators should be a mission the U.S. national security apparatus conducts.  Shutterstock/ NDE12019

The same commercialized recommender systems that now strongly influence consumers’ decisions are being harnessed to conduct large-scale information operations on U.S. citizens.

 

U.S. and EU To Collaborate Against Ransomware

Homeland Security Secretary Alejandro Mayorkas (c), speaking to European Union counterparts in Portugal on June 21 during the U.S.-E.U. Ministerial Meeting of Justice and Home Affairs, has announced that the Department of Homeland Security and the EU will form a working group to examine ransomware attacks. Credit: DHS

The organizations are forming a working group to strengthen ties in the fight against adversarial cyber activity.

 

New Cyber Training Unit Empowers Digital Defenders

Senior Airman Thomas Goodnoe, USAF, tactical network operations technician, 1st Combat Communications Squadron (l), and Staff Sgt. Darryl Terry, USAF, cyber transport supervisor, 1st CBCS, review their systems against their technical guides during a cybersecurity audit in 2017 at Ramstein Air Base, Germany. The Air Force has added a new detachment that will provide initial training to cybersecurity airmen before they reach their mission locations. Credit: U.S. Air Force photo/Staff Sgt. Timothy Moore

Six-month old Air Force detachment takes the burden off of operational units for cyber training.

 

Flying Right Into Open Architecture

In its pursuit of open architecture solutions, the U.S. Navy has made “great strides” in applying the Mission Computer Alternative (MCA) platform, which is a Hardware Open Systems Technologies- (HOST-) conforming mission computer. The service is currently testing the MCA/HOST platform in its E-2D Advanced Hawkeye tactical airborne early warning aircraft and in its T-45 training aircraft (above)—and is considering how to advance the solutions to other platforms.  U.S. Navy photo

The U.S. military is using open architecture platforms on a greater scale, deploying interchangeable hardware and software systems to its major weapon programs.




Cyber Resources

On-Demand Webinar: Parsing The White House Executive Order

The recent Executive Order on Improving the Nation's Cybersecurity details six key outcomes that the White House is trying to achieve. Join Netskope's Chief Evangelist, Bob Gilbert, in this on-demand ...
 

You Rushed to the Cloud - Now It's Time to Assess and Address Cloud Security

The pandemic prompted a rush to the cloud. Fast action was critical given the rapidly expanded work-from-home requirements and the need for touchless procurement, sales and service. Now the initial ru ...
 

SpiderOak offers compliance with new cyber executive order

President Bidens new cybersecurity requirements have been a ng time coming, and fit with trends we have observed and incorporated at SpiderOak. For example, the executive order will bring the govern ...
 

Cyber Hygiene Key to Protecting Networks

Recent cyberattacks against critical infrastructure, such as the May 2020 attack on the Colonial Pipeline Company, have put a spotlight on cybersecurity vulnerabilities. Identifying and combating cybe ...
 

Securing DoD Cloud Platforms by Breaking Silos

As the Department of Defense migrates more mission-critical systems and software to cloud environments, it must also consider an innovative way for securing this new environment from potential cyber a ...
 

Getting DoD to the Cloud, Faster

As the U.S. Department of Defense (DoD) drives forward on its cloud strategy, development teams and chief information officers alike are looking for faster ways to deploy new capabilities, proactively ...
 

Establishing a Federal Digital Service Academy

Winning in cyberspace is at root a human problem. We urgently need to build the next generation of digital leaders to prepare both government and civil society to defend and deter in this venue. It is ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.