The Cyber Edge Home Page


Adversarial Machine Learning Poses a New Threat to National Security

Threat Tracker is an autonomous threat detection system developed by a small team of engineers and scientists within Naval Surface Warfare Center Panama City Division’s Coastal and Maritime Security branch. Integrated with an advanced unmanned surface vehicle, this system can provide a fully autonomous USV escort capable of detecting and stopping a wide variety of threats. (U.S. Navy graphic)

As new attack techniques and defense countermeasures are being implemented, caution needs to be exercised by U.S. military forces in employing new AI systems in mission-critical operations.


On Point: Q&A With Raj Iyer

Q&A with Raj Iyer, Army chief information officer, who advises the secretary of the Army, setting the strategic direction and objectives for information technology and information management.


Experts Highlight Continued Software Vulnerabilities

Cyber and national security experts are quite alarmed with the systemic cybersecurity vulnerabilities of Microsoft Corp’s products, the company’s dependence on China for product revenue and associated consolations to the Chinese government, as well as the U.S. government’s incredible reliance on the Microsoft products across its agencies. Credit: Shutterstock/The Art of Pics

National security and cyber experts see a huge problem with chronic cyber issues for widely used programs.


DHS Seeks To Ensure 5G Cybersecurity

Fifth-generation cellular communications will be more secure than predecessor technologies but will also introduce vulnerabilities, in part because of the vast expansion of devices that is expected with the emergence of the Internet of Things. SERDTHONGCHAI/Shutterstock

A DHS program designed to secure fifth-generation cellular communications known as 5G could complete the last of its nine projects next year.


Federal Zero Trust Policy Implementation

Eric Mill, a senior advisor to the federal chief information officer and one of the primary authors of the Office of Management and Budget’s zero trust policy, speaks with Matthew McFadden, vice president, cyber and distinguished technologist, General Dynamics Information Technology, at a Billington CyberSecurity event on June 16.

One of the principal authors of the January 2022 policy to shift the U.S. government toward zero trust shares his insights.


Zero Trust Key to Operational System Cyber Protection

F-16 Fighting Falcons conduct aerial operations in the U.S. Central Command area of responsibility in May. In theory, a cyber attack on a military base wastewater treatment plant could prevent jets from providing air support during combat, experts say. Credit: Air Force Master Sgt. Matthew Plew

Operational and information technologies are converging at a rapid pace, broadening the cyber attack surface, but zero trust, cross-training and other measures may help.

Cyber Resources

Making the Case for a Federal Bureau of Statistics

AFCEA International's Cyber Committee is pleased to present this white paper as part of the members' series of white papers designed to inform an evolving national cybersecurity strategy. This paper, ...

The Danger of Cognitive Stress on Tactical Cyber Operations

Cybersecurity professionals, especially on-net defenders, experience striking similarities to stress-inducing factors as do first responders. While discussions at cybersecurity conferences dating to 2 ...

Embracing Zero Trust: A Guide for Agencies to Address the Cybersecurity Executive Order

The Cybersecurity Executive Order has agencies committed to taking a more proactive stance against the rapidly intensifying surge of phishing and ransomware attacks against our nation. The Lookout se ...

Supply Chain Cybersecurity

Supply Chain Cybersecurity includes a complex of everyday operating issues affected by a network of known and unknown connections, services and components. In this white paper, the AFCEA Homeland Secu ...

2021 ICS Cybersecurity Year in Review - Executive Summary

Get a high-level overview of the 2021 Year in Review findings, showcasing key stories and results specific to the ICS/OT threat landscape and industrial cybersecurity maturity. ...

Understanding Cybersecurity Maturity Model Certification (CMMC) 2.0 Compliance

A Government Contractor's Guide to Preparation and Assessment Basics.


The Cyber Edge January 2022

Last year's evacuation of civilians from Afghanistan was a massive undertaking with multiple challenges and successes. ­e withdrawal required enormous amounts of data, which also presented some obstac ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.