The Cyber Edge Home Page


Up-Tempo Technology Progress Shifts Power Balance

The NATO Ministers of Defence meet in February to prepare for its summit later this year. Among the topics socially distanced attendees discussed were progress on burden sharing and missions in Afghanistan and Iraq. Credit: NATO

NATO is at risk of losing its technology edge because of emerging and disruptive technologies increasingly developed within the civil sector.


The Other Side of Zero Trust

Senior Airman Rose Li, USAF (l), and Airman 1st Class Eric Gardella, USAF, 86th Communications Squadron wing cyber readiness technicians, monitor malicious network activity during exercise Tacet Venari at Ramstein Air Base, Germany, in 2020 to prepare local cyber defenders in safeguarding critical technological infrastructures. U.S. Air Force photo by Staff Sgt. Devin Boyer

The more important aspect of zero trust relates to application and workload connections, which is what attackers care about and is not being protected today.


U.S. Cyber Command Saw 'Unique' Challenges in 2020

Adversaries are no longer merely launching attacks from their part of the world, says Gen. Paul Nakasone, USA, commander, U.S. Cyber Command, testifying before Congress on March 25. “They can come in the United States and use our infrastructure, and there is a blind spot for us not being able to see them,” he warns.

The command’s leader reports no compromise of DOD information networks from SolarWinds breach.


China Posing Power Challenge

China’s consolidated control its political mechanisms enables a unity of effort difficult to achieve in democracies. Credit: Shutterstock/Poring Studio

As China has modernized and gained strength, it appears to have sought mechanisms by which it can shape the international system and tools that afford it unique influence and privileges equal to—and perhaps surpassing—those of the United States.


Cybersecurity Turns Holistic

Credit: DHS

The U.S. must engage in an informed debate about cybersecurity and how to stop the damage being inflicted by adversaries, says the director of intelligence, CYBERCOM.


DARPA Hopes Mobile Carrier Will Adopt Secure 5G

The DARPA OPS-5G program has set some ambitious goals, including adoption of the technology by a mobile carrier near a military base and machine translation of open source standards. Credit: ZinetroN/Shutterstock

If all goes as planned, a major mobile cellphone carrier will ultimately adopt technology developed under the DARPA Open, Programmable, Secure 5G program.

Cyber Resources

Packet Capture is a Foundational Technology for Cyber Security

As distributed applications and cloud services have become commonplace, the increased complexity in network and application architectures has made it challenging for teams to ensure the reliability, p ...

Merging Security Layers Aid DOD Cloud Security

As the U.S. government migrates to cloud-centric networks, the need to protect them from rapidly evolving cyber threats increases. This shifting environment presents Defense Department planners with s ...

Getting Left of Boom: How to Defeat Ransomware and Other Cyber Threats

There is a virulent plague spreading across the globe, Homeland Security Secretary Alejandro Mayorkas warned earlier this year. But he wasn't talking about COVID-19. Instead, he was referring to what ...

Achieving Multidomain Operations through Virtualization

The U.S. Department of Defense is returning to a command-and-control concept embracing joint and allied operations with the added domains of space and cyberspace adding to the mission space. But while ...

Cybersecurity Embraces the New Normal

The COVID-19 pandemic has forced federal agencies and private businesses around the world to adapt to a new reality, one where most of their employees now work remotely and communicate virtually. This ...

Hunting hackers with deep packet analysis

As cybersecurity threats become more sophisticated, organizations need a way to quickly detect and stop an attack or track and analyze its aftereffects for clues. Deep packet analysis, or packet sniff ...

Retaining Experienced Cybersecurity Professionals

It appears that once a new data breach makes it to the public, there are conversations that follow wanting to highlight the demand for cyber security professionals. Recent data confirms trends from pr ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.