The Cyber Edge Home Page

  • China’s consolidated control its political mechanisms enables a unity of effort difficult to achieve in democracies. Credit: Shutterstock/Poring Studio China Posing Power Challenge

    As China has modernized and gained strength, it appears to have sought mechanisms by which it can shape the international system and tools that afford it unique influence and privileges equal to—and perhaps surpassing—those of the United States.

  • Credit: DHS Cybersecurity Turns Holistic

    The U.S. must engage in an informed debate about cybersecurity and how to stop the damage being inflicted by adversaries, says the director of intelligence, CYBERCOM.

  • The DARPA OPS-5G program has set some ambitious goals, including adoption of the technology by a mobile carrier near a military base and machine translation of open source standards. Credit: ZinetroN/Shutterstock DARPA Hopes Mobile Carrier Will Adopt Secure 5G

    If all goes as planned, a major mobile cellphone carrier will ultimately adopt technology developed under the DARPA Open, Programmable, Secure 5G program.


U.S. Defense Department Expands 5G Experimentation

A signal support system specialist prepares a radio system used to allow soldiers and airmen to keep in constant communications with one another during their missions. Graphic illustration by Regina Ali, U.S. Defense Department

The U.S. Defense Department already is looking beyond its massive $600 million investment in 5G experiments announced in October.


6G Will Blur the Lines Between the Physical and Digital Worlds

One of the key challenges about 6G will be operating in ultra-high frequencies—in terahertz—and AT&T has started internal corporate development and external research at 60 U.S. universities to shape solutions for the next generation of wireless communication. Credit: Shutterstock/Den Rise

As the fifth-generation wireless network known as 5G rolls out, experts already look ahead to the sixth iteration of the wireless network.


Mission Networks Require Service Management

Coalition Warrior Interoperability Exercise 2019 (CWIX 2019) hosted at the NATO Joint Force Training Centre in Bydgoszcz, Poland, showcased military interoperability between NATO personnel, processes and technologies. Credit: Dawn Stankus, NATO

Military, industry and research representatives assemble annually to test a wide range of technologies and processes for their practical applicability and interoperability in an international network.


Intelligence Telework May Leave Digital Footprints

U.S. intelligence community personnel may be more vulnerable while telecommuting during the pandemic, but so are U.S. adversaries, experts point out. Credit: enzozo/Shutterstock

“How do we know we’re not leaving digital breadcrumbs all over?” 


Disruptive by Design: Transcending Cyber

Credit: Shutterstock/Potential Filmmaker

The Defense Department has an information warfare (IW) problem. There's no organization within the department that directs, synchronizes and coordinates IW planning and operations.


FBI Considers Zero Trust Architecture

The FBI is examining how zero trust architecture could apply to its cybersecurity measures. Credit: Shutterstock/Kristi Blokhin

Authorizing official weighs its application with existing FBI platforms.

Cyber Resources

Circadence Webinar - Transitions to Cloud

As state and local governments shift operations to the cloud, it is more important than ever to stay on the front lines of cyber defense as cyber pros figure out how to secure cloud-based applications ...

China, Cyberspace and Hybrid State Power

The rise of China as a peer competitor vying for superpower status has emerged as an important challenge for the United States. The AFCEA Cyber Committee opens the discussion of China's hybrid approac ...

Cyber Insurance

The Cyber Insurance Subcommittee of AFCEA International's Cyber Committee concluded cyber insurance is useful in risk transference but with some important caveats. For example, a purchase decision is ...

The Cyber Edge January 2021

When the GAO performs cybersecurity-related audits and reports its findings, the watchdog provides key recommendations to agencies to improve their networks and information technology from risks. The ...

Strengthening the Nation's Cybersecurity Strategy, Part Two

The AFCEA Cyber Committee is pleased to present the second in a series of white papers designed to inform an evolving national cybersecurity strategy. While many cybersecurity recommendations focus on ...

How a Government Defense Ministry used Coordinated Cyber Training to Counter Imminent Threats, Develop Operator Skills

Cyber security experts estimate that 90% of cyber-attacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to DOD's Principal Cyber Advisor. ...

Strengthening the Nation's Cybersecurity Strategy

Cybersecurity and its relationship to the national interests have evolved swiftly and will continue to do so. AFCEA International's Cyber Committee offers strategy recommendations as a result of numer ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.

Introducing AFCEA’s​ Cyber Edge Writing Contest

Sponsored by ManTech

FOCUS: The Future of Cyber Warfighting

APPROACH: • Explain the threat. • Describe a solution and how it could (or is) alleviating current dangers. • Report on activities that are either possible, necessary or already underway to implement the technology, program or concept.

PRIZES: The top three authors will each receive a monetary prize and have their articles published in SIGNAL Media. • First place $5,000 • Second Place $2,000 • Third Place $1,000

Deadline for submission: Feb 8, 2021

For Contest Details and Eligibility: