The Cyber Edge Home Page


Army Encryption Chip Finishing Initial NSA Testing

Army Sgt. Evan Tosunian (l) and Sgt. Allan Sosa, both assigned to the California Army National Guard’s 224th Sustainment Brigade, install single-channel ground and airborne radio systems in a Humvee at the National Guard armory in Long Beach, California, in May. The Army’s standardized, reprogrammable encryption chip known as RESCUE will help secure communications for radios, computers, unmanned vehicles and other systems. Credit: Army Staff Sgt. Matthew Ramelb, California Army National Guard

The U.S. Army’s universal, reprogrammable encryption chip is in final testing and could soon be available to the joint community and even industry.


Army Builds Software Readiness

Roderick Wilson performs a scan to ensure all computer equipment on the installation has the proper operating system and software patches installed at Anniston Army Depot. Credit: Jennifer Bacchus

The chairman, Joint Chiefs of Staff, and the Army has rebuilt its tactical readiness and is now expanding to focus on strategic readiness.


Red Means Stop, Cyber Means Nothing

When people around the world are communicating, they must use precise terms to ensure they are referring to the same topics, problems, results and solutions. Credit: Shutterstock/

Before the United States can engage with threats effectively, the war against words must take place, including to overuse of the word cyber.


Government Agencies’ Cyber Breach Expected

When the GAO performs cybersecurity-related audits and reports its findings, it provides key recommendations to agencies to improve their networks and information technology from risks. Illustration by Chris D’Elia based on images from GAO Reports and lurri Motov/Shutterstock

The GAO investigates possible weaknesses or cybersecurity gaps and makes key recommendations to rectify problems. In some ways, it saw the latest cyber breach coming.


EU Releases New Cyber Strategy for Digital Decade

The European Union's new Cybersecurity Strategy aims to safeguard a global and open Internet, while at the same time offering safeguards, according to a published announcement. Credit: mixmagic/Shutterstock

The new strategy could allow the EU to step up leadership on international norms and standards in cyberspace, and to strengthen cooperation with partners around the world.


Intelligence Inoculates Against Cyber Intruders

Joint Force Headquarters-Department of Defense Information Network officials use threat intelligence to bolster the defense of the network against a surge of attacks during the pandemic. Source: Rafal Olechowski/Shutterstock

Open source and commercially available intelligence, along with the fusion of cyber and intelligence analysis, help protect DOD networks against a surge of attacks during the pandemic.

Cyber Resources

How a Government Defense Ministry used Coordinated Cyber Training to Counter Imminent Threats, Develop Operator Skills

Cyber security experts estimate that 90% of cyber-attacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to DOD's Principal Cyber Advisor. ...

Strengthening the Nation's Cybersecurity Strategy

Cybersecurity and its relationship to the national interests have evolved swiftly and will continue to do so. AFCEA International's Cyber Committee offers strategy recommendations as a result of numer ...

The Cyber Edge September 2020

A Cyber Thread Runs Through Government Future Assessments.
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas. ...

Effectively Integrating Cybersecurity Into Enterprise Risk Management

Cybersecurity is now a significant area of focus and concern for senior leaders of public and private organizations. Unfortunately, for too many organizations, cybersecurity continues to be a technica ...

What Defense Manufacturers Need to Know About the Cybersecurity Maturity Model Certification - Manufacturing Webinar Series

All defense manufacturers know that it is of utmost priority to protect the defense supply chain from cybersecurity threats. The success of your business now depends on the cybersecurity of your suppl ...

The Cyber Edge July 2020

Network data collection, analysis and sharing are core to cyber defense, and Tinisha McMillan is on a mission to improve all three. ...

Meeting Cyber SA and NetOps Challenges with IQ-Core Software

Cyber Situational Awareness, (SA) is top of mind for DoD decision makers. There is a critical need across defense information systems for cyber security SA that enables cyber professionals and decisio ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.

Introducing AFCEA’s​ Cyber Edge Writing Contest

Sponsored by ManTech

FOCUS: The Future of Cyber Warfighting

APPROACH: • Explain the threat. • Describe a solution and how it could (or is) alleviating current dangers. • Report on activities that are either possible, necessary or already underway to implement the technology, program or concept.

PRIZES: The top three authors will each receive a monetary prize and have their articles published in SIGNAL Media. • First place $5,000 • Second Place $2,000 • Third Place $1,000

Deadline for submission: Feb 8, 2021

For Contest Details and Eligibility: