The Cyber Edge Home Page


SOCOM Seeks to Unleash Connectivity

U.S. Special Operations Command (SOCOM) personnel and partner nation representatives examine SOF radio equipment at Air Force Special Operations Command. SOCOM seeks radios that are independent of partners or places so that SOF operators on the move can communicate seamlessly.

Cutting the communications cord is a goal of SOCOM as it prepares for missions against a new type of foe.


When IoT Devices Go Rogue, Automation Saves the Day

Global information system technology is an integral part of farming. Tampering with these devices via the Internet could cause farmers to make decisions based on faulty data.

The ability to access data on any device from any device multiplies productivity but creates unforeseeable vulnerabilities we're only beginning to understand.


Incoming: A Model for Building a Civilian Reserve Cyber Corps

A civilian cyber corps could support two of U.S. Cyber Command’s three primary missions: defend Defense Department networks to ensure their data is held securely and defend critical infrastructure.

A civilian reserve cyber corps deserves strong consideration as a way to add more capacity to the cyber work force.


An Intelligent Path to Network Modernization

The new generation of network solutions associated with the EIS contract vehicle will benefit all involved—the agencies, the vendors and the taxpayers. Credit: chombosan/Shutterstock

The EIS contract will usher in a new era of telecom with a diverse set of solutions for upgrading to the next generation of network technology.


Cyber Experts Sound the Alarm

Gen. Mark A. Milley, USA, chief of staff of the Army, speaks at CyConUS 2017.

The United States must continue to make inroads in the cyber domain, or it "will lose the war."


Savings, Security Need Not Be Mutually Exclusive

Software-defined networking offers an array of network modernization benefits.

Many U.S. Defense Department networks are built on outdated legacy architecture never designed to address continually evolving threat vectors. 

Cyber Resources

It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management

Your approach to vulnerability management may be putting your organization at greater risk. Just dealing with vulnerabilities that a vendor said were "critical" isn't enough and may still leave you su ...

Transforming Datacenter Operations at the Tactical Edge

The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure in ...

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions ...

Threat Hunting For Dummies, Carbon Black Special Edition

Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intr ...

The Cyber Edge - April 2017

The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M ...

Cybersecurity - A Strategic Problem

Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a ...

Key Cyber Issues and Recommendations: A Way Forward

Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!