The Cyber Edge Home Page


Military Must Move Out to Implement Zero Trust

Military readiness relies on an exchange of information among many different systems, which creates numerous cybersecurity challenges. Credit: U.S. Defense Department/J.M. Eddins Jr., Air Force

With no end in sight to cybersecurity challenges, the government must move quickly and deliberately to adopt an architecture to protect against outside threats.


Code as Contract

A new digital rubicon looms on the horizon: the use of open source code as a condition within U.S. Defense Department and intelligence community software acquisition contracts. Credit: Shutterstock/ihor2020

A new digital rubicon is looming: the use of open source code as a condition within DOD and intelligence community software acquisition contracts.


Tackling CMMC Compliance

An important step toward Cybersecurity Maturity Model Certification is to conduct a Certified Third Party Assessor Organizations (C3PAO) assessment. Credit: Shutterstock/H_Ko

Using these 12 steps, companies can effectively manage the transition from noncompliance to compliance.


DISA Applies AI to Network Defense

Credit: Shutterstock/Ryzhi

As it advances its application of robotic process automation, DISA is expanding its AI efforts through a research agreement and a new pilot program.


Making Sense of Intelligent Bots

Credit: Shutterstock/Fit Ztudio

DISA is employing robotic process automation to several of its processes in finance, public affairs, circuit management, security authorization and procurement.


The 16th Air Force Enables Zero Trust Advancements

Lt. Gen. Timothy Haugh, USAF (right c), commander, 16th Air Force (Air Forces Cyber), and Chief M. Sgt. Kenneth Bruce, USAF (r), command chief, 16th Air Force, discuss the 2nd Combat Weather Systems Squadron efforts during a visit at Hurlburt Field, Florida, in April. The command, which spent the last two years integrating information warfare capabilities including weather intelligence, sees zero trust as a core technology. Credit: USAF photo by Senior Airman Robyn Hunsinger

Leader of the Numbered Air Force is fully supporting the “core technology.”

Cyber Resources

Managed Attribution: A Foundation for Effective Online Operations

Managed attribution (MA) is the process of controlling the technical and behavioral indicators that comprise your online identity (or attribution). By managing their attribution, operators, investigat ...

Cyber Range as a Service

For companies that have or make use of production network infrastructures whether private or public, in the cloud or a hybrid, there is a need for developers, consumers of the infrastructure, and the ...

The Cyber Edge July 2021

The U.S. Navy is moving ahead at full speed to equip its assets with e¬ective cybersecurity. However, the diverse nature of those assets, some are city-size ships while others are small but vital syst ...

Public-Private Partnerships Key To Combatting Cyberthreats

Adopting a security by design approach is helping SolarWinds improve its security while also promoting supply chain security with its customers. ...

The Cyber Edge October 2021

Coast Guard Embarks on Cyber Offense. The service blends its traditional maritime roles with expanded digital strengths to thwart adversaries. ...

Air Force IT modernization aims to streamline, speed up operations

The U.S. Air Force IT enterprise deals with a range of needs, from managing services such as help desk tickets to managing major initiatives such as cybersecurity and cloud migration programs. Governa ...

AFCEA TechNet Augusta Solutions Abstract

With assistance from the U.S. Army Cyber Center of Excellence and industry experts, TechNet Augusta 2021 is designed to open the lines of communication and facilitate networking, education and problem ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.