The Cyber Edge Home Page

1
2
3

DHS Builds Position, Navigation and Timing Framework

Positioning, navigation and timing is critical to an array of critical infrastructure areas, including the electrical power grid, finance and transportation. The U.S. government is working to harden so-called PNT systems against jamming, spoofing and other vulnerabilities, in part by developing a resiliency framework. Credit: Shutterstock/NicoElNino

A DHS framework will ultimately improve resilience for systems that provide positioning, navigation and timing for a wide variety of users.

 

Symposium Tackles Cyber Workforce Challenges

At the Cyber Education, Research, and Training Symposium 2019, Brig. Gen. Dennis A. Crall, USMC, (now a Maj. Gen.) principal deputy cyber adviser, Office of the Secretary of Defense, said warfighter education and training must focus on mission preparation.

To ensure U.S. warfighters have the training they need to fill military cyber openings, AFCEA will host the Cyber Education, Research, and Training Symposium.

 

Scientists Capture Lightning Data for Electric Grid Cybersecurity

The data captured from lightning strikes around the world may help to secure the U.S. electrical grid from cyber attacks. Credit: Vasin Lee/Shutterstock

Monitoring global lightning strikes could help detect cyber attacks on the U.S. electrical grid, according to researchers who have a patent pending to do just that.

 

It Is All About the Nodes

U.S. Air Force A-10 Thunderbolt II jets fire flares while breaking away after aerial refueling from a KC-135 Stratotanker of the 340th Expeditionary Aerial Refueling Squadron out of Kandahar Airfield, Afghanistan, in August. In multidomain operations in the future, the Air Force will need a highly connected web of sensors across the air, land, sea and space.  U.S. Air Force photo by Staff Sgt. Keifer Bowes

As the U.S. Air Force is working to define operations on the battlefield of the future, sensors or other digitally connected devices will play a key role but on a much larger scale.

 

DISA Prototypes Eliminate Cyber Threats Daily

DISA’s Cloud Based Internet Isolation prototyping initiative eliminates potential threats from unclassified networks by showing Internet browsers a movie-like representation of the the websites they view. The agency plans to select one of two prototypes in the spring. Credit: Alexander Supertramp/Shutterstock

The Defense Information Systems Agency (DISA) Cloud Based Internet Isolation prototyping effort is already eliminating cyber threats every day.

 

 

Multidomain Operations May Hinge on IoT Capabilities

Green Beret forces train for multidomain operations in a joint exercise with the U.S. Air Force. Adapting technologies and capabilities from the Internet of Things (IoT) may hold the key toward achieving vital capabilities for Army multidomain warfighters.  U.S. Army

The U.S. Army is looking toward the Internet of Things to reshape the future force for multidomain operations.




Cyber Resources

Will Your Security Solution Fit the New CMMC Framework?

The Cybersecurity Maturity Model Certification (CMMC) promises to have significant impact on the state of cybersecurity requirements for US DIB contractors. Each member of the DIB supply chain plays a ...
 

NIST: 800-160(2) and 800-171(B) Securing High Value Assets and Confidential Unclassified Information

The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respective ...
 

Signal Cyber Edge October 2019

Cyber policy traditionally has focused more on enterprise networks than tactical systems, according to Nancy Kreidler, the Army's new leader for the Cybersecurity and Information Assurance Directorate ...
 

Cyber Insurance

The Cyber Insurance Subcommittee of AFCEA International's Cyber Committee concluded cyber insurance is useful in risk transference but with some important caveats. For example, a purchase decision is ...
 

Signal Cyber Edge July 2019

The whole is greater than the sum of its parts when the two combine forces for information technology. BY ROBERT K. ACKERMAN

The U.S. Army is building a tighter relationship with industry to t ...
 

Why UEM is the key to enterprise IT security?

Free e-book that aids in improving your enterprise IT security
Most IT admins have asked themselves at some point in time, "How do I achieve and sustain enterprise IT security?"

With cybercr ...
 

Cyber Deception: How to Build a Program

With traditional cybersecurity, companies play a cat-and-mouse game to identify, block, and prevent threats. A deception program changes this by giving defenders the ability to learn about attackers i ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.


Introducing AFCEA’s​ Cyber Edge Writing Contest
The Digital Frontier


Sponsored by ManTech

FOCUS: The exploration of ongoing or potential cyber hazards and threats as well as possible solutions or current activities or programs that address these challenges.

APPROACH: • Explain the threat. • Describe a solution and how it could (or is) alleviating current dangers. • Report on activities that are either possible, necessary or already underway to implement the technology, program or concept.

PRIZES: The top three authors will each receive a monetary prize and have their articles published in SIGNAL Media. • First place $5,000 • Second Place $2,000 • Third Place $1,000

Deadline for submission: Feb 3, 2020

For Contest Details and Eligibility:

https://cyber.afcea.org/TheCyberEdgeWritingContest2020