The Cyber Edge Home Page


Information Warfare Requires Personalized Weaponry

The ability to create a digital alter ego would put control of sharing personal information in an individual’s hand. Artificial intelligence within the device also would warn an owner when data is likely disinformation aimed at influencing behavior. Credit: sdecoret/

Today’s information warfare does not fit the traditional war model. It comprises an unlimited number of potential combatants with hidden identities and agendas.


Future Network Defense Needs Self-Healing AI Systems

The Automated Virtual Agent for Truth Assessments in Real Time, developed at San Diego State University, can detect changes in physiology and behavior during interviews with travelers. Photo by Aaron Elkins

Data accuracy and integrity will be crucial to effective cybersecurity.


Contractors Are a Bull's-Eye for Hackers

Small contractors remain cyber's weak link in the defense industrial chain. Credit: TheDigitalArtist/Pixabay

As large defense contractors invest heavily in securing their networks, adversaries turn their attention to smaller defense suppliers for cyber attacks.


Moving Beyond Passwords

Credit: sp3n/Shutterstock

Powered by AI and machine learning, technologies such as facial recognition and behavioral biometrics are promising frictionless identity authentication.


McAfee Releases Predictions for 2019 Cybersecurity Landscape


The digital criminal underground is becoming stronger as hackers start to collaborate.


Cyber Assumes New Role in U.S. Indo-Pacific Command

Adm. Philip S. Davidson, USN, commander of the U.S. Indo-Pacific Command, describes the command's new cyber challenges and policy at TechNet Asia Pacific 2018 in Honolulu.

The U.S. Indo-Pacific Command is seeking the capabilities and enabling technologies to conduct “full-spectrum cyber operations” in its vast region of responsibility.

Cyber Resources

Intelsat-29e Interference Mitigation Testing

Cyber threats are growing more advanced, with networks constantly under attack from entities in search of critical data to deny transmission or steal information. Intelsat EpicNG delivers reliability, ...

2018 Trends in Cybersecurity: Building Effective Security Teams

As cybersecurity has become more complex, traditional methods do not account for the wide range of issues related to securing corporate data and handling privacy concerns. New technology, improved pro ...

Turning Data into a Strategic Asset for the Warfighter

Federal agencies increasingly need data-derived insights to address complex challenges, deliver mission success, and optimize resources for maximum effectiveness and efficiency. Whether the challenge ...

BIG DATA STRATEGIES: Protecting Information from Theft and Tampering

Cybercriminals have long profited by selling stolen financial and personal data. Of late, they've added another alarming technique: encrypting an organization's data where it's stored and demanding pa ...

Building Cyber Resilient Technologies

For a computing paradigm, "Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation". Resilience is related to survivab ...

The Key to Beating Perpetual Cyberattacks

The cyber domain is like any other military or intelligence theater of operations: Success requires highly skilled, well-trained and experienced professionals.

Technology in the form of advance ...

Today’s Insider Threat – It’s Real!

As commercial corporations and government agencies continue to spend countless millions of dollars on protecting their most valued asset (data) from outside cyber-attacks and ever so increasing inside ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.