The Cyber Edge Home Page

1
2
3

Army Defensive Cyber Operations Maintain Balancing Act

Soldiers analyze network data during a cyber academy class at Fort Bragg, North Carolina. The project manager, defensive cyber operations (PM DCO), is working to boost Army cyber capabilities while shortening the training time line to empower more soldiers for the cyber defense mission. U.S. Army photo

Speed is of the essence as the U.S. Army works earnestly with industry to equip the force with the latest tools to combat cyber attacks.

 

Indo-Pacific Command Plays its Digital Card

The amphibious assault ship USS Boxer anchors off the coast of Phuket, Thailand. The U.S. Indo-Pacific Command is advancing the quality of technology in multinational training exercises, so allies and partners can interoperate in cyber the way they might have to in regional operations. U.S. Navy photo

The U.S. Indo-Pacific Command incorporates new cyber technologies and standards as it strives for greater interoperability with allies and potential partners.

 

Complex Connections Demand New Processes

Spc. Dillon Anton, USA, and Spc. Matthew Perry, USA, 601st Aviation Support Battalion, 1st Infantry Division, Combat Aviation Brigade, set up and validate a Combat Service Support Very Small Aperture Terminal (CSS-VSAT) in preparation of Combined Support Exercise at Storck Barracks, Germany.

The increase in cybersecurity policies and advances in capabilities highlights the need for highly trained personnel and better management processes.

 

Stop Blaming NSA for Cyber Attacks

The National Security Agency is not to blame for the recent ransomware attack on the city of Baltimore, says Noah Schiffman, KRB chief technology adviser. Credit: Shutterstock/Stephen Finn

Initial news reports on the recent ransomware attack leveled against the city of Baltimore erroneously claimed that the ransomware leveraged an NSA-developed exploit to compromise the city's municipal systems.

 

Army PEO EIS Brings Industry Under the Tent

Servicemen participate in a cyber warrior exercise overseas. The U.S. Army’s program executive officer for enterprise information systems (PEO EIS) is striving to speed new software into cyber systems while maintaining effective operations. U.S. Army Reserve photo

The U.S. Army taps commercial expertise to avoid long procurement delays that often render new information technologies obsolete before they are fielded.

 

Stealth Attacks Require Stealth Responses

Looking Glass stock

Global, asymmetrical threats now dominate attacks on nations and businesses alike, and the enemy is not always immediately knowable, identifiable or even seen.




Cyber Resources

Why UEM is the key to enterprise IT security?

Free e-book that aids in improving your enterprise IT security
Most IT admins have asked themselves at some point in time, "How do I achieve and sustain enterprise IT security?"

With cybercr ...
 

Cyber Deception: How to Build a Program

With traditional cybersecurity, companies play a cat-and-mouse game to identify, block, and prevent threats. A deception program changes this by giving defenders the ability to learn about attackers i ...
 

Beyond the Phish

In our deepest and most wide-ranging report yet, we explore user knowledge of a broad range of best practices for cyber hygiene, security, and compliance. The report analyzes millions of responses gat ...
 

State of the Phish

This cybersecurity report analyses data from tens of millions of simulated phishing attacks sent through Proofpoint's Security Education Platform over a 12-month period, as well as an extensive survey ...
 

SIGNAL Executive Video: Wrapping Software Licensing in a Blanket Purchase Agreement

Nothing in the field of information technology is more dynamic than software development. For consumers, individual personal mobile communications devices are constantly upgraded by weekly downloads o ...
 

MULTI-DOMAIN SITUATIONAL AWARENESS

TABLE OF CONTENTS 1. Threats evolution in the cyber-space 2. Situational awareness to face multi-domain threats 3. Cyber situational awareness: Leonardo solution 4. AI to improve human performance and ...
 

Protecting Critical Infrastructure in the DoD Landscape

This document includes an overview of critical infrastructure, the associated cybersecurity challenges including a background on industrial control system (ICS) security, and provides a synthesis of t ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.