The Cyber Edge Home Page

1
2
3

The Navy Goes Parallel With New Digital Capabilities

A U.S. Navy operations specialist uses a radar system in a combat information center in the 7th Fleet area of operations. The U.S. Navy’s PEO C4I and Space Systems is focusing on parallel development of digital assets and capabilities to speed innovation to the fleet. Credit: U.S. Navy

The U.S. Navy is focusing on parallel development of its new digital assets and capabilities as it works to rush advanced information innovations to the fleet.

 

Zeroizing Network Shrinks Attack Surfaces

Senior Airman Daniel M. Davis, USAF, 9th Communications Squadron information system security officer, looks at a computer in the cybersecurity office on Beale Air Force Base. Cybersecurity airmen must manage more than 1,100 controls to maintain the risk management framework. Credit: U.S. Air Force photo by Airman Jason W. Cochran

Users need to transition all networked computing from the commercial central processing unit addiction to pure dataflow to increase security.

 

Current Threats Require Multifactor Protection

Leslie Bryant, civilian personnel office staffing chief, demonstrates how to give fingerprints to Jayme Alexander, Airmen and Family Readiness Center casualty assistance representative selectee. Although requiring fingerprints to access information is better than single-factor identification verification, it should be part of a multifactor authentication approach. Credit: 2nd Lt. Benjamin Aronson, USAF

Two-factor authentication is often heralded as the silver bullet to safeguard online accounts, but recent events have weakened confidence in the approach.

 

Lax Cybersecurity Threatens Missions

Enterprisewide Risk Management (ERM) consists of the formal identification of major risks to the organization’s mission.

Cybersecurity is now a significant area of focus to senior leaders who have witnessed significant financial and reputational damage from adversaries.

 

Rapid AI Development Demands Reform

The U.S. Government Accountability Office (GAO) is exploring the ramifications of a number of emerging disruptive technologies. Credit: GAO file photo

The pervasiveness of cyber requires the federal government to delve into regulatory issues, privacy concerns, economic competitiveness and security requirements.

 

Cloud Computing Lets IARPA Carry on During COVID-19

Unmanned aircraft have proved immensely valuable to the military and to intelligence agencies, but they are sometimes too noisy for stealthy reconnaissance. The Intelligence Advanced Research Projects Activity is developing a silent and miniature aerial drone known as the Little Horned Owl. Credit: U.S. Defense Department photo by Petty Officer 3rd Class Jeffrey S. Viano, U.S. Navy

Cloud computing infrastructure at IARPA allowed the organization to pivot to a new teleworking norm during COVID-19 that’s not much different than the old norm.




Cyber Resources

The Cyber Edge September 2020

A Cyber Thread Runs Through Government Future Assessments.
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas. ...
 

Effectively Integrating Cybersecurity Into Enterprise Risk Management

Cybersecurity is now a significant area of focus and concern for senior leaders of public and private organizations. Unfortunately, for too many organizations, cybersecurity continues to be a technica ...
 

What Defense Manufacturers Need to Know About the Cybersecurity Maturity Model Certification - Manufacturing Webinar Series

All defense manufacturers know that it is of utmost priority to protect the defense supply chain from cybersecurity threats. The success of your business now depends on the cybersecurity of your suppl ...
 

The Cyber Edge July 2020

Network data collection, analysis and sharing are core to cyber defense, and Tinisha McMillan is on a mission to improve all three. ...
 

Meeting Cyber SA and NetOps Challenges with IQ-Core Software

Cyber Situational Awareness, (SA) is top of mind for DoD decision makers. There is a critical need across defense information systems for cyber security SA that enables cyber professionals and decisio ...
 

Open Source Software and Mission-Critical Applications: A Cautionary Tale

AFCEA International Cyber Committee The efficiencies of using and embedding open source software imply a number of risks. AFCEA Cyber Committee members have examined the origins of the OSS trend, its ...
 

Small Business Cybersecurity

AFCEA International Small Business Committee and Cyber Committee Rapid technology changes create new security vulnerabilities that require small businesses to expend resources to remain compliant. The ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.


Introducing AFCEA’s​ Cyber Edge Writing Contest


Sponsored by ManTech

FOCUS: The Future of Cyber Warfighting

APPROACH: • Explain the threat. • Describe a solution and how it could (or is) alleviating current dangers. • Report on activities that are either possible, necessary or already underway to implement the technology, program or concept.

PRIZES: The top three authors will each receive a monetary prize and have their articles published in SIGNAL Media. • First place $5,000 • Second Place $2,000 • Third Place $1,000
 

Deadline for submission: Feb 8, 2021

For Contest Details and Eligibility:
https://afcea.informz.net/AFCEA/pages/TCE_Writing_Contest