The Cyber Edge Home Page

1
2
3

Four Steps To Reduce IoT Risk

Devices such as copiers have been updated with Internet connectivity, creating a potential risk as an entry point to the network. Credit: Andrey_Popov/Shutterstock

In the past two years, hackers have increasingly targeted Internet of Things devices to breach cybersecurity defenses, increasingly aimed at corporate networks.

 

Cyber Personnel Unification Boosts Battle Power

U.S. Marines with 8th Communication Battalion, II Marine Expeditionary Force Information Group, collaborate as part of Team Spartan during Cyber Fury 2020. Cyber Fury is an annual training exercise that allows Marines to simulate a series of cyberspace attacks by identifying and countering them. Credit: Lance Cpl. Haley McMenamin, USMC

With the 2020 election fast approaching and tensions with Iran continually shifting, many people are looking to U.S. Cyber Command to help ensure cybersecurity.

 

Free Software Can Cost Plenty

It’s tempting to think of open source software as free, but users must take into consideration the cost of systems and data protection. Credit: Wright Studio/Shutterstock

The efficiencies of using open source software carry a number of risks.

 

DARPA's Quantum Quest May Leapfrog Modern Computers

DARPA’s Optimization with Noisy Intermediate-Scale Quantum (ONISQ) program intends to leapfrog current computing technology by combining classical and quantum computing capabilities to tackle a widespread class of problems known as combinatorial optimization problems, which have national security, commercial and global implications. Credit: Yurchanka Siarhei and Boex Design/Shutterstock. Edited by Chris D’Elia​

In the future, anyone trying to figure out how to use limited resources may reap the benefits of computers that are a hybrid of quantum and classical systems.

 

Quantum Information Science Matters

Advances in quantum information science will allow the military a different approach to communications and networking. Credit: Shutterstock

Across the U.S. Air Force’s research arm, scientists are developing quantum information science capabilities in four key areas of interest to the service.

 

Control Systems Need Software Security Too

Hollis Roush, a Coast Guard Cadet intern at the Massachusetts Institute of Technology Lincoln Laboratories (MITLL), demonstrates a prototype representative industrial control system. Credit: Glen Cooper, MIT Lincoln Laboratory

Attackers are increasingly targeting control systems because they've recognized their vulnerability as well as the strategic importance of these critical assets.




Cyber Resources

Meeting Cyber SA and NetOps Challenges with IQ-Core Software

Cyber Situational Awareness, (SA) is top of mind for DoD decision makers. There is a critical need across defense information systems for cyber security SA that enables cyber professionals and decisio ...
 

Open Source Software and Mission-Critical Applications: A Cautionary Tale

AFCEA International Cyber Committee The efficiencies of using and embedding open source software imply a number of risks. AFCEA Cyber Committee members have examined the origins of the OSS trend, its ...
 

Small Business Cybersecurity

AFCEA International Small Business Committee and Cyber Committee Rapid technology changes create new security vulnerabilities that require small businesses to expend resources to remain compliant. The ...
 

The Who, What, Why and How of DDoS Attacks: A Guide for IT Pros

The IT industry has seen a major increase of Distributed Denial of Service (DDoS) attacks over the past several years. The December 2019 New Orleans cyberattack is such an example: This attack combine ...
 

Your Guide to Building a CSfC Approved Solution

For decades, Type 1 has been the NSA's most prized cybersecurity designation. Recent years, however, have seen the growth of NSA's Commercial Solutions for Classified (CSfC) program, which offers an a ...
 

The Cyber Edge April 2020

Daily cyber attacks and other threats naturally take up the short-term attention of many governmental agencies, but there is a need for a more strategic look at risks to the nation's critical infrastr ...
 

Securing the Enterprise when employees work remotely

For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportuni ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.