The Cyber Edge Home Page

1
2
3

Stealth Attacks Require Stealth Responses

Looking Glass stock

Global, asymmetrical threats now dominate attacks on nations and businesses alike, and the enemy is not always immediately knowable, identifiable or even seen.

 

Supply Chains May Pose Weakest Security Link

Bill Bickert, assistant commander for supply chain management policy and performance, Naval Supply Systems Command, visits the command’s Fleet Logistics Center–Jacksonville, Florida, headquarters. Supply chain monitoring software is useful; however, ensuring suppliers are providing clean components is crucially important as well. Photo by Carol Williams

Adversaries are exploiting the inherent vulnerabilities of U.S. military supply chains that involve tens of thousands of private sector providers.

 

Ubiquitous Connections Depend Upon Additional Security Skills

Maj. Gen John C. Harris Jr., ANG (c), the adjutant general, Ohio National Guard, observes training while the Cyber Mission Assurance Team (CMAT) conducts network assessments during exercise week of Cyber Shield 19 at Camp Atterbury, Indiana. The National Guard is standing up the teams to help secure the critical infrastructure that services U.S. Defense Department installations. U.S. Army National Guard Photo by Staff Sgt. George B. Davis

As emerging technologies and capabilities permeate and dominate, a different skill set is required to secure the increasingly complex cyberspace realm.

 

Cyber Militia Launches Nonprofit to Share Technology

The Missouri Cyber Team, a part of the National Guard, developed RockNSM an open source cybersecurity system. Now, they are building a nonprofit organization to help share that system with others. Credit: Missouri National Guard Cyber Team

Creating a nonprofit organization ensures that a cybersecurity solution created by the Missouri National Guard Cyber Team will remain freely available.

 

AI May Pose More Questions Than Answers

Artificial intelligence and machine learning are still technically in their infancy. Both show promise in the military and government arenas, but experts still have many questions.

Classified Cyber Forum seeks to answer some of the questions AI and machine learning pose to the military and intelligence agencies.

 

Cyber Militia Innovation Meets Mission Needs

Cyber warriors with the National Guard are sometimes similar to colonial-era militiamen, fighting with whatever technological weapons they have at home or building the tools they need. Alexander Herasymchot/Shutterstock and U.S. Defense Department courtesy photo

National Guard members conducting cyber ops found themselves poorly equipped, so they banded together and built the system they needed on a shoestring budget.




Cyber Resources

MULTI-DOMAIN SITUATIONAL AWARENESS

TABLE OF CONTENTS 1. Threats evolution in the cyber-space 2. Situational awareness to face multi-domain threats 3. Cyber situational awareness: Leonardo solution 4. AI to improve human performance and ...
 

Protecting Critical Infrastructure in the DoD Landscape

This document includes an overview of critical infrastructure, the associated cybersecurity challenges including a background on industrial control system (ICS) security, and provides a synthesis of t ...
 

Protecting Critical Infrastructure in the DoD Landscape

This document includes an overview of critical infrastructure, the associated cybersecurity challenges including a background on industrial control system (ICS) security, and provides a synthesis of t ...
 

Dynamic Deception for Industrial Automation and Control Systems

The implementation of a comprehensive cybersecurity plan to protect Industrial Automation and Control Systems (IACS), including SCADA, is critical to protecting confidential company information, compl ...
 

Signal Cyber Edge April 2019

This edition of The Cyber Edge celebrates and recognizes the contributions of women in cybersecurity and STEM. All of the articles in the section were written by women and feature expert opinions on o ...
 

MEASURING SECURITY: Making Sense Out of a Modern-Day Tower of Babel

Despite obvious and compelling needs for ways to measure security, AFCEA's Cyber Committee found that there is no consensus about how to measure security. To the contrary, its members found that the s ...
 

Attivo Networks® ThreatDefend™ Platform and the MITRE ATT&CK Matrix

The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Matrix provides a model for cyber
adversary behavior, reflecting various phases of an adversary's lifecycle and ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.