The Cyber Edge Home Page

1
2
3

Data-Driven Framework Attacks the Cyber Monster

Credit: Shutterstock

Framework performs threat-based cybersecurity architecture assessments to ensure DOD leadership has the insight to make well-informed, prioritized cybersecurity investment decisions.

 

DISA Executive Emphasizes Innovation

Anthony Montemarano, executive deputy director, DISA, speaks at the Defensive Cyber Operations Symposium.

As the Department of Defense is working to improve lethality, it is making the transition to fight in the domain of cyber.

 

DISA Director Provides a 3D Outlook

Vice Adm. Nancy Norton, USN, DISA director and commander of JFHQ-DODIN, speaks at the AFCEA Defensive Cyber Operations Symposium.

The agency is working toward driving innovation, delivering solutions and defending the cyber domain.

 

Four Cybersecurity Policies Transforming Government

Four policies give government agencies they flexibility and authority to limit cyber risks. Credit: katielwhite91/Pixabay

Federal agencies must develop strategies to anticipate risks and implement defensive measures to minimize cyber risks. The government now has the authority and flexibility to do that.

 

Navy Ninjas Master Information Warfare Arts

Credit: Guayo Fuentes/Shutterstock

U.S. Navy personnel with advanced skills in information warfare may be ready to hit the decks and deploy across the fleet by year’s end.

 

In Network Defense, Time Is of the Essence

An Arkansas Air National Guard technical sergeant works in a cybersecurity incident response training exercise. The Joint Force Headquarters-Department of Defense Information Network (JFHQ-DODIN) is expanding its reach into U.S. Defense Department networks and accelerating the pace of cyber defense as it confronts new challenges from adversaries.

The organization tasked with protecting U.S. Defense Department networks is looking to accelerate its ability to detect and respond to enemy cyber attacks.




Cyber Resources

Cyber Threat Intelligence: Moving cyber security to the heart of our business

Cyber Threat Intelligence (CTI) is a collection of data points (e.g. Open source, Social media, Human, Deep Web) and ultimately boils down to three questions:
- What do you have of value or import ...
 

Solving the Cybersecurity Challenges of Federal Agencies

Managing today's network infrastructures can present challenges for federal agency IT leaders-from demands for higher performance,
to compliance with new standards and regulations, to integrating e ...
 

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee

This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve pr ...
 

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee

This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve pr ...
 

It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management

Your approach to vulnerability management may be putting your organization at greater risk. Just dealing with vulnerabilities that a vendor said were "critical" isn't enough and may still leave you su ...
 

Transforming Datacenter Operations at the Tactical Edge

The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure in ...
 

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.