The Cyber Edge Home Page


Digital Cloak of Invisibility Fends Off Intruders

Venera Salman/Shutterstock

Cloaking a device’s address gives a hacker nothing to see, and it can be done on systems ranging from government networks to medical electronics.


Fighting Cyber With Cyber

Soldiers demonstrate the Command Post Computing Environment prototype at Aberdeen Proving Ground. With a new single tactical server infrastructure plus a common software baseline, it will provide soldiers an underlying core command post system. U.S. Army photo by Dan Lafontaine, PEO C3T

SDN checks off every set of standards for the COE while delivering the mission assurance commanders need to execute their warfighting functions.


DOD Poised to Help DHS Secure Elections

Credit: daniel_diaz_bardillo/Pixabay

Under a new memorandum of understanding with DHS, the U.S. Defense Department will step up efforts to share information for critical infrastructure protection.


Five Cybersecurity Steps for SMB Contractors

Small and medium-sized defense contractors are increasingly targeted by malicious hackers seeking to steal intellectual property. Credit: GDJ/Pixabay

Malicious actors have put significant manpower into compromising small- and medium-sized businesses.


Is AI Resilient Enough for Security?

Artificial intelligence is still too easily fooled to secure networks without human assistance. Credit: geralt/Pixabay

Artificial intelligence is not smart enough to replace humans in cybersecurity.


Breaking Down Silos to Combat the IoT Threat

Technical, physical, and departmental silos could undermine the government’s Internet of Things security efforts. Credit: methodshop/Pixabay

IoT-connected devices and apps have the potential to do some serious damage. 

Cyber Resources

2018 Trends in Cybersecurity: Building Effective Security Teams

As cybersecurity has become more complex, traditional methods do not account for the wide range of issues related to securing corporate data and handling privacy concerns. New technology, improved pro ...

Turning Data into a Strategic Asset for the Warfighter

Federal agencies increasingly need data-derived insights to address complex challenges, deliver mission success, and optimize resources for maximum effectiveness and efficiency. Whether the challenge ...

BIG DATA STRATEGIES: Protecting Information from Theft and Tampering

Cybercriminals have long profited by selling stolen financial and personal data. Of late, they've added another alarming technique: encrypting an organization's data where it's stored and demanding pa ...

Building Cyber Resilient Technologies

For a computing paradigm, "Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation". Resilience is related to survivab ...

The Key to Beating Perpetual Cyberattacks

The cyber domain is like any other military or intelligence theater of operations: Success requires highly skilled, well-trained and experienced professionals.

Technology in the form of advance ...

Today’s Insider Threat – It’s Real!

As commercial corporations and government agencies continue to spend countless millions of dollars on protecting their most valued asset (data) from outside cyber-attacks and ever so increasing inside ...

TechNet Augusta 2018 Solutions Showcase Compendium

As part of TechNet Augusta 2018, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the cyber electromagnetic ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.