The Cyber Edge Home Page


Comprehensive Check Prevents Failure Fallout

Sgt.1st Class Joshua Shirey, USA, maintenance instructor for the Army’s new Joint Light Tactical Vehicle, teaches a class about suspension to 33 soldiers enrolled in the first-ever iteration of the course at Fort McCoy, Wisconsin. The 96-hour Field-Level Maintenance New Equipment Training course involves classroom and hands-on training for soldiers and contractors. Credit: Staff Sgt. Brigitte Morgan, USAR

Military leaders need increased awareness of the dangers that arise from the systems used daily in training, deployment and garrison environments.


Nontechnical Professionals Follow Path to Cybersecurity Work

The first week of Federal Cybersecurity Reskilling Academy (FCRA) coursework takes place at U.S. Department of Education headquarters, where students are immersed in the SANS CyberStart Essentials course. Credit: Denis Largeron

Graduates of a new federal cyber academy prove that individuals with high aptitude and motivation can gain the skills needed to enter the cybersecurity workforce.


Defensive Teams Help Protect the Air Force Mission

The Air Force’s Air Combat Command, newly in charge of the service’s Cyber Mission, is deploying specialized mission defense teams to protect particular weapon systems such as an F-22, pictured flying over Alaska during an exercise in May, or an F-35 or a key infrastructure component such as an air operations center. Credit: U.S. Air Force photo by Staff Sgt. Micaiah Anthony

Led by the Air Combat Command, the Air Force’s integration of cybersecurity includes deploying protective crews to its key airborne platforms and infrastructure.


Even Weather Intelligence Faces Stormy Cyber Days

Tech. Sgt. David Mooers (l) and Senior Airman Mario Lunato, 2nd System Operations Squadron system administrators, access one of the core servers in the 557th Weather Wing enterprise at Offutt Air Force Base, Nebraska. The wing is employing specialized cybersecurity crews on top of other cyber defenses to protect weather intelligence. U.S. Air Force photo by Paul Shirk

Given increasing threat levels, the Air Force is employing cybersecurity measures to protect its data, especially to safeguard weather-related information.


Identity and Authentication Seek a New Paradigm

Many experts think the future of identity verification is a single authentication that applies across all disciplines of verification. Credit: ktsdesign/Shutterstock

The secret word is out and crypto is in. Passwords are being abandoned in favor of a range of new methods that are more secure and, in some cases, more user friendly.


Mind Control of Machines Isn't Brain Surgery Any More

The Defense Advanced Research Projects Agency’s Next-Generation Nonsurgical Neurotechnology (N3) program is developing technology that improves the ability to control machines using only the brain—without surgical implants. Credit: Fer Gregory, Shutterstock

Researchers funded by the U.S. military may develop a working prototype of a system that allows for a nonsurgical interface between the human brain and technology.

Cyber Resources

NIST: 800-160(2) and 800-171(B) Securing High Value Assets and Confidential Unclassified Information

The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respective ...

Signal Cyber Edge October 2019

Cyber policy traditionally has focused more on enterprise networks than tactical systems, according to Nancy Kreidler, the Army's new leader for the Cybersecurity and Information Assurance Directorate ...

Cyber Insurance

The Cyber Insurance Subcommittee of AFCEA International's Cyber Committee concluded cyber insurance is useful in risk transference but with some important caveats. For example, a purchase decision is ...

Signal Cyber Edge July 2019

The whole is greater than the sum of its parts when the two combine forces for information technology. BY ROBERT K. ACKERMAN

The U.S. Army is building a tighter relationship with industry to t ...

Why UEM is the key to enterprise IT security?

Free e-book that aids in improving your enterprise IT security
Most IT admins have asked themselves at some point in time, "How do I achieve and sustain enterprise IT security?"

With cybercr ...

Cyber Deception: How to Build a Program

With traditional cybersecurity, companies play a cat-and-mouse game to identify, block, and prevent threats. A deception program changes this by giving defenders the ability to learn about attackers i ...

Beyond the Phish

In our deepest and most wide-ranging report yet, we explore user knowledge of a broad range of best practices for cyber hygiene, security, and compliance. The report analyzes millions of responses gat ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.