The Cyber Edge Home Page


Cyber Threat Intelligence Leader Warns of Changing Nature of Attacks

Michael Moss, deputy director of the Cyber Threat Intelligence Integration Center (CTIIC), Office of the Director of National Intelligence (ODNI), told Congress that CTIIC remains concerned by the "increasingly damaging effects of cyber operations and the apparent acceptance by adversaries of collateral damage." Credit: Shutterstock/EVorona

Adversaries are becoming even more assertive and capable of using cyberspace to threaten the U.S., says the deputy director of the Cyber Threat Intelligence Integration Center.


Five Steps to Prepare for the Next Cyber Attack

Agencies should consider taking five fundamental steps to fortify networks before the next cyber attack. Credit: Daria-Yakovleva/Pixabay

When another threat rears its head, government networks and the professionals who manage them can be better equipped to meet it head on.


Army Leads Other Services in Cyber Realm

Fort Gordon, Georgia, is home to the Army Cyber Command and the Army Cyber Center of Excellence. U.S. Army photo

“The Army is the example that I hold up to my fellow sailors. The Army is doing it exactly right,” Rear Adm. William "Bill" Leigher, USN (Ret.). 


Key Cyber Provisions of the NDAA

Soldiers from the 10th Mountain Division (LI) perform an air assault demonstration for President Trump during a visit to Fort Drum, New York, on August 13. The demonstration was part of the President’s ceremony to sign the National Defense Authorization Act of 2019, which authorizes funding for U.S. defense and military activities for Fiscal Year 2019. Photo credit: U.S. Army photo by Sgt. Thomas Scaggs.

Congress’ NDAA for Fiscal Year 2019 takes cybersecurity a step further, with language affirming DOD’s role in defending against attacks and operating in cyberspace.


Convergence Guides Army Cyber

A U.S. Army paratrooper communicates by radio during a drop in Latvia. Traditional radio and network status information will play a key role in cyber situational awareness in the digital battlespace. Credit: Army photography by Spec. Dustin Biven, USA

Intelligence, electronic warfare and signals lock arms in the digital battle.


This Is No One-Size-Fits-All Army Modernization

Army combat units on the move need different networking capabilities from support units that set up camp and stay awhile. Service officials intend to develop a modernized network capable of being scaled and adapted depending on the operational situation. Credit: Spc. Hubert D. Delany III, USA

The U.S. Army’s major overhaul of its network may lead to a communications structure capable of conforming to an array of operational situations.

Cyber Resources

Today’s Insider Threat – It’s Real!

As commercial corporations and government agencies continue to spend countless millions of dollars on protecting their most valued asset (data) from outside cyber-attacks and ever so increasing inside ...

TechNet Augusta 2018 Solutions Showcase Compendium

As part of TechNet Augusta 2018, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the cyber electromagnetic ...

Securing Government Desktops from Cyber Threats with the Latest KVM Technology

Foreign nations, terrorists, and cyber criminals see state and local government IT infrastructure as an extremely attractive target for data theft, attacks, and disruption. Attacks have taken down ent ...

Building a Culture of Cybersecurity: A Guide for Corporate Executives and Board Members

According to the World Economic Forum, a majority of business leaders indicated that cyberattacks are their top concern heading into 2018. For many organizations, there needs to be an important shift ...

Is Your Investment in Cybersecurity Training Paying Off?

The modern world takes place in a largely digital space. Underneath the physical assets that drive our businesses are mountains of data and personal information. The digitizing of information has had ...

Cyber Threat Intelligence: Moving cyber security to the heart of our business

Cyber Threat Intelligence (CTI) is a collection of data points (e.g. Open source, Social media, Human, Deep Web) and ultimately boils down to three questions:
- What do you have of value or import ...

Solving the Cybersecurity Challenges of Federal Agencies

Managing today's network infrastructures can present challenges for federal agency IT leaders-from demands for higher performance,
to compliance with new standards and regulations, to integrating e ...

More from the Resource Library ...

AFCEA Corporate Member CYBER Directory

AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!

Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.