The Cyber Edge Home Page


Cellphone Assured Identity Solution Offers Promise

A sensitive compartmented information facility may no longer be a fortress that bars entry to cellphones. Credit; Shutterstock/Andrea Crisante

Mobile technology is not always available to military or government personnel in all environments, but new solutions could enable its use in secure facilities.


Government Seeks Forward-Looking Industry Solutions

Credit: Rabbit_Photo/Shutterstock

A number of technologies have risen to the top because of their potential to address military challenges and to prosper commercially in the future.


FBI Strives to Keep Ahead of Cyber Adversaries

International hackers are not the only ones planting ransomware on unsuspecting victims. Nation-states also are using it as part of their cyber attack arsenal, and the FBI is working with domestic and international partners to thwart their efforts.

The FBI increases its cooperative efforts with U.S. government agencies and overseas allies as it wages an unending battle against growing cyber adversaries.


Time for a Changing of the Guard

The Ohio National Guard Cyber Mission Assurance Team conducts network assessments during Cyber Shield 19. The Cyber Mission Assurance teams help secure the critical infrastructure that services U.S. Defense Department installations. Credit: Staff Sgt. George Davis, OHNG

To remain relevant, the Army National Guard must completely divest GuardNet, its IT network, and converge with the Army’s Department of Defense Information Network.


Open Architecture Delivers Cybersecurity Advantages

ManTech  conducts a cyber testing and training exercise with cyber experts from the financial sector.

The rapid pace of technology adoption has leveled the playing field in global competition and opened new warfare domains in the space and cyber realms.


Buyers Must Prepare and Beware

A company considering a cyber insurance purchase must determine the risk to its organization and if a single policy will cover the type of loss it may experience.

Cyber insurance can protect organizations from losing more than data, but choosing a cyber insurer and policy comes with its own caveats.

Cyber Resources

The Cyber Edge January 2020

FBI Strives to Keep Ahead of Cyber Adversaries.
A rapidly changing threat environment compels increased cooperation. ...

Will Your Security Solution Fit the New CMMC Framework?

The Cybersecurity Maturity Model Certification (CMMC) promises to have significant impact on the state of cybersecurity requirements for US DIB contractors. Each member of the DIB supply chain plays a ...

NIST: 800-160(2) and 800-171(B) Securing High Value Assets and Confidential Unclassified Information

The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respective ...

The Cyber Edge October 2019

Cyber policy traditionally has focused more on enterprise networks than tactical systems, according to Nancy Kreidler, the Army's new leader for the Cybersecurity and Information Assurance Directorate ...

Cyber Insurance

The Cyber Insurance Subcommittee of AFCEA International's Cyber Committee concluded cyber insurance is useful in risk transference but with some important caveats. For example, a purchase decision is ...

The Cyber Edge July 2019

The whole is greater than the sum of its parts when the two combine forces for information technology. BY ROBERT K. ACKERMAN The U.S. Army is building a tighter relationship with industry to tap comme ...

Why UEM is the key to enterprise IT security?

Free e-book that aids in improving your enterprise IT security
Most IT admins have asked themselves at some point in time, "How do I achieve and sustain enterprise IT security?"

With cybercr ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.

Introducing AFCEA’s​ Cyber Edge Writing Contest
The Digital Frontier

Sponsored by ManTech

FOCUS: The exploration of ongoing or potential cyber hazards and threats as well as possible solutions or current activities or programs that address these challenges.

APPROACH: • Explain the threat. • Describe a solution and how it could (or is) alleviating current dangers. • Report on activities that are either possible, necessary or already underway to implement the technology, program or concept.

PRIZES: The top three authors will each receive a monetary prize and have their articles published in SIGNAL Media. • First place $5,000 • Second Place $2,000 • Third Place $1,000

Deadline for submission: Feb 3, 2020

For Contest Details and Eligibility: