The Cyber Edge Home Page


Cloud-Based Systems Security Must Be Shared

Overspending on cyber tools and appliances placed in the wrong location or configured poorly can be equally bad if not worse than under-resourcing. 2,500 years before the advent of digital networking, military strategist Sun Tzu’s advice is still applicable: You must know your enemy and know yourself to be victorious. Credit: Pexels/meo

Security is among the single greatest concern government agencies have about moving their systems to the cloud, particularly data and system protection.


Staying Cyber Safe While Teleworking

With the Coronavirus driving more people to work or study from home, it is more important than ever for private individuals and families to secure their home networks. Credit: Manolines/Shutterstock

As people around the world practice self-isolation due to COVID-19, the need to maintain a strong cybersecurity posture arguably has never been higher.


Kaspersky Labs Confrontation Sets Template

Credit: Shutterstock

Measures from Cybersecurity and Infrastructure Security Agency and Justice Department set tone for cybersecurity supply chain trust.


Bipartisan Commission Sounds Alarm on Cyber Insecurity

The bipartisan Cyberspace Solarium Commission has released a report warning of cyberspace insecurity in the United States and offering more than 75 recommendations. Credit: Inna Bigun/Shutterstock

A report from the Cyberspace Solarium Commission issues a call to action on the nation’s lack of security in cyberspace.


Using a Software Bill of Materials to Unveil Vulnerabilities

Known as a software bill of materials, a list of software components, information about those components and their relationship to the supply chain, are key elements in building supply chain transparency. Credit: Shutterstock/Andrey Suslov

Having a detailed description of the software components in any software-based product is necessary to identify cyber vulnerabilities and reduce risks.


The Supply Chain Risk Is Hidden in Plain Sight

Threats to the supply chain—especially cyber threats—continue to grow. Credit: Leyn/Shutterstock

Cybersecurity threats continue to grow and evolve, giving new reasons to refocus on the security of contractors, subcontractors and suppliers.

Cyber Resources

Securing the Enterprise when employees work remotely

For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportuni ...

Taking the Risk out of Software Supply Chain Management

Supply chain management is vitally important to running and maintaining an organization's IT systems. When it is carried out, in many federal agencies it's traditionally a manual process managed on sp ...


The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respective ...

Daedalus Enterprise Search Appliance

Department of Defense agencies are using Elasticsearch for a variety of workloads, ranging from cybersecurity to logistics. These organizations require a secure, simple to deploy enterprise platform t ...

The U.S. Cybersecurity Industrial Base and National Security

This white paper conveys to U.S. national security policy makers and decision makers observations and recommendations regarding the nation's cybersecurity industrial base and this sector's ability to ...

The Cyber Edge January 2020

FBI Strives to Keep Ahead of Cyber Adversaries.
A rapidly changing threat environment compels increased cooperation. ...

Will Your Security Solution Fit the New CMMC Framework?

The Cybersecurity Maturity Model Certification (CMMC) promises to have significant impact on the state of cybersecurity requirements for US DIB contractors. Each member of the DIB supply chain plays a ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.