The Cyber Edge Home Page


Cyber Institute Probes All Dimensions of Extended Reality

Using virtual reality, soldiers from Fort Sill, Oklahoma, get a look at components of the Army’s new prototype Long Range Hypersonic Weapon and a chance to influence how the system is designed. In the future, units may use 3D printers to build their own virtual reality headsets.  U.S. Army

The Realities Lab at the Army Cyber Institute explores every aspect of extended reality technologies, developing new tools and conducting studies.


Flying Right Into Open Architecture

In its pursuit of open architecture solutions, the U.S. Navy has made “great strides” in applying the Mission Computer Alternative (MCA) platform, which is a Hardware Open Systems Technologies- (HOST-) conforming mission computer. The service is currently testing the MCA/HOST platform in its E-2D Advanced Hawkeye tactical airborne early warning aircraft and in its T-45 training aircraft (above)—and is considering how to advance the solutions to other platforms.  U.S. Navy photo

The U.S. military is using open architecture platforms on a greater scale, deploying interchangeable hardware and software systems to its major weapon programs.


U.S. Cyber Command Hunts Forward

Gen. Paul Nakasone, USA, commander, U.S. Cyber Command; director, National Security Agency; and chief, Central Security Service, pictured speaking in 2019 with cyber soldiers assigned Fort Meade, expects an increase in the number of cyber teams deployed at the request of foreign governments to help defend against cyber marauders. Credit: Steven Stover, 780th Military Intelligence Brigade (Cyber)

The nation’s cyber force, when called upon, deploys to other nations to protect against nefrarious adversarial behavior in the digital realm.


Bridging the Gap Between the IC and Private Assets of National Importance

Operating for just about 7 months, the Analysis and Resilience Center for Systemic Risk, or ARC, has a unique role in helping to protect industry-owned assets that have implications to national security if attacked by cybermauraders. Credit: Shutterstock/xtock

The Analysis and Resilience Center has the unique role of helping to protect industry-owned infrastructure.


Cyber Hygiene Key to Protecting Networks in a Changing Online Environment

Cyber adversaries are creating a “wild west” environment in cyberspace where organizations must be aware of their security to protect themselves, said Gene Yoo, CEO of Resecurity Inc. Credit: Shutterstock

Combating cyber adversaries is a broad area requiring significant amounts of human intelligence and a deep technical expertise to identify them.


NETCOM Commander: AI and ML Adoption Begins With Data

Data science and management are the first priorities when adopting artificial intelligence and machine learning, says the commander of U.S. Army Network Enterprise Technology Command. Credit: agsandrew/Shutterstock

In the early stages of adopting AI and ML, the data needs to be the first priority.

Cyber Resources

You Rushed to the Cloud - Now It's Time to Assess and Address Cloud Security

The pandemic prompted a rush to the cloud. Fast action was critical given the rapidly expanded work-from-home requirements and the need for touchless procurement, sales and service. Now the initial ru ...

SpiderOak offers compliance with new cyber executive order

President Bidens new cybersecurity requirements have been a ng time coming, and fit with trends we have observed and incorporated at SpiderOak. For example, the executive order will bring the govern ...

Cyber Hygiene Key to Protecting Networks

Recent cyberattacks against critical infrastructure, such as the May 2020 attack on the Colonial Pipeline Company, have put a spotlight on cybersecurity vulnerabilities. Identifying and combating cybe ...

Securing DoD Cloud Platforms by Breaking Silos

As the Department of Defense migrates more mission-critical systems and software to cloud environments, it must also consider an innovative way for securing this new environment from potential cyber a ...

Getting DoD to the Cloud, Faster

As the U.S. Department of Defense (DoD) drives forward on its cloud strategy, development teams and chief information officers alike are looking for faster ways to deploy new capabilities, proactively ...

Establishing a Federal Digital Service Academy

Winning in cyberspace is at root a human problem. We urgently need to build the next generation of digital leaders to prepare both government and civil society to defend and deter in this venue. It is ...

The Cyber Edge April 2021

The national security community needs to prepare
now for the possibility that U.S. adversaries could
be first to develop and deploy quantum computers, which would render useless most conventiona ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.