The Cyber Edge Home Page


Network Defense for a 5G and 6G World Looms

Technological solutions like the Defense Department’s combat cloud are important, but how such technologies are operationalized will be key to 6G network defense.  Shutterstock/Fit Ztudio

The spate of 2021’s high-profile cyber attacks has caused policymakers and practitioners to seriously reevaluate the state of security in the U.S.


Signal and Cyber Schools Teach Army's Future Today

A team leader with 1st Battalion, 504th Parachute Infantry Regiment, directs movements of his team using the Harris Leader Radio during an assault on an objective during the initial operating test for the system. The rapid development and fielding of cutting-edge systems help drive the need for agility and adaptability at Army signal and cyber schools.  Nicholas Robertson, U.S. Army Operational Test Command Visual Information Specialist

The U.S. Army’s massive modernization effort requires rapid adaptability in the courses being taught in its cyber and signal schools.


Diversity Is Key to Training and Education in Cybersecurity

Educating and training people in cybersecurity will require a broader reach in both personnel and material.  Andrey Suslov/Shutterstock

The changing nature of threats and countermeasures cries out for new perspectives in cybersecurity, commercial experts say.


Next-Generation Cybersecurity Telemetry Offers Promise

Telemetry is the use of automation to manage communications across multiple data sources and speed the detection of threats.  Frame Stock Footage/Shutterstock

Across the federal government, agencies are dealing with an explosion of cybersecurity data—and the pace shows no sign of slowing.


Navy Prepares for Round Two of Information Warfare Consortium Projects

Building on the success of the first round of prototype awards of the Information Warfare Research Project (IWRP), the Naval Information Warfare Center Atlantic and the Naval Information Warfare Systems Command (NAVWAR) will be pursuing up to $500 million of projects under IWRP round two. Credit: NAVWAR Illustration by Wendy M. Jamieson

Industry day for IWRP 2 is December 15; NIWC and NAVWAR select ATI as consortium manager.


CISA Names Cybersecurity Advisory Committee Members

The director of the Cybersecurity and Infrastructure Security Agency announced the appointment of 23 members of the agency’s new Cybersecurity Advisory Committee. Credit: Gorodenkoff/Shutterstock

The committee will make recommendations on a variety of topics collectively aimed at strengthening CISA and more broadly reshaping the cyber ecosystem to favor defense. 

Cyber Resources

Technology Brief: Meeting the US Presidential Executive Order for Zero Trust

The new U.S. Presidential Cybersecurity Executive Order for Zero Trust requires US Federal agencies to transition to a Zero Trust Architecture (ZTA). These new ZTA recommendations still do not effecti ...

Jumpstarting Rural Broadband Initiatives

High-speed Internet access is critical to economic opportunity, job creation, education and civic engagement. All Americans, whether living and working in cities or the nation's rural areas, need reli ...

Zero Trust Architectures and the Tactical Domain: A Round Peg in a Square Hole?

The Zero Trust Architecture (ZTA) has rapidly become the hottest topic in cybersecurity. However, REDCOM has noticed that today's discussions inevitably focus on ZTA from the standpoint of the enterpr ...

Optimizing Your Zero Trust Environment for Secure Video Conferencing

Zero Trust is shaping the future of data security for government organizations. In this white paper, you'll learn what Zero Trust is, how it works, and why data-centric security matters. You'll also d ...

Executive Order on Improving

On May 12, 2021, President Biden signed an Executive Order (EO) to improve the nation's cybersecurity and protect federal government networks. True improvement necessitates the adoption of modern appr ...

Layer 1 Matrix Switches provide ultra-secure, ultra-scalable, any-to-any connectivity for mission-critical Military Applications

Applications that require a high level of security and guaranteed packet delivery are best served by a Layer 1 Matrix Switch. Many types of applications, from video distribution systems for command an ...

Managed Attribution: A Foundation for Effective Online Operations

Managed attribution (MA) is the process of controlling the technical and behavioral indicators that comprise your online identity (or attribution). By managing their attribution, operators, investigat ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.