The Cyber Edge Home Page

1
2
3

Ukraine Growing Cyber Capabilities From Within

Ukraine's defense industry is strengthening its forces, including its cyber capabilities.

Aimed at protecting itself and other Eastern European countries, Ukraine is developing capabilities against its aggressors.

 

IoT Risks Loom Over Critical Infrastructure

A single cyber attack could cripple an entire city, such as New York, which helps fuel the national economy, experts warn.

With the IoT promising, or perhaps threatening, to connect many more millions of devices, experts are urging action.

 

Three Clues Your App Has Been Hacked

Nearly every business has an app, and if the app is not secure, neither is the business.

Most organizations find out too late they've been hacked and are left to control damage.

 

The Science of Cybersecurity

A group of DHS researchers focused on fortifying homeland security has cybersecurity technology development down to a science.

 

Hope for a Holy Grail of Continuous Monitoring

There's no quick route to address increasingly sophisticated cyber attacks or to undo years of neglect wrought by avoiding the problem.

 

Training Machine Learning for Cyberthreats

In an evolving cyberthreat landscape, organizations must adopt more advanced ways to protect crucial data.




Cyber Resources

Transforming Datacenter Operations at the Tactical Edge

The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure in ...
 

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions ...
 

Threat Hunting For Dummies, Carbon Black Special Edition

Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intr ...
 

The Cyber Edge - April 2017

The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M ...
 

Cybersecurity - A Strategic Problem

Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a ...
 

Key Cyber Issues and Recommendations: A Way Forward

Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve ...
 

Feds: You have a BYOD program whether you like it or not

Many agencies believe they aren't actually subject to cyber-threats from mobile devices because, simply, they don't currently allow personal mobile devices to access their networks. Ultimately, howeve ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!