The Cyber Edge Home Page

1
2
3

Information Warfare Platform Goes to Sea

The amphibious assault ship USS Bataan (LHD 5) departs Naval Base Norfolk. It will be one of two ships to initially carry the Information Warfare Platform to sea. Photographer’s Mate 1st Class Shawn Eklund/U.S. Navy​

Before the end of the fiscal year, the Navy intends to deliver an early version of the IWP to two ships before fielding more comprehensive systems.

 

Military Aims for Identity Security Trifecta

Spc. Damaris Vazquez, USA, an orderly room clerk with 90th Human Resources Company, Special Troops Battalion, 3rd Infantry Division Sustainment Brigade, Fort Stewart, Georgia, scans a common access card at Fort Jackson, South Carolina, to process soldiers in units assisting with Hurricane Florence relief efforts. Credit: Sgt. Elizabeth White, USA/Released

The Pentagon looks to buy an enterprisewide identity management system to provide a single authoritative source of user information and identity authentication.

 

Keys to Building A World-Class Cybersecurity Workforce

Photo Credit: Gorodenkoff/Shutterstock

Keys to building a world-class cybersecurity workforce include altering the pipeline and changing the perception of it, as well as showing people cybersecurity can be fun.

 

Six Cyber Fraud Predictions for 2020

Now that identity is the currency of the digital world and data is the fuel that powers the digital economy, digital identities are continually being compromised on multiple levels. Credit: Tashatuvango/Shutterstock

Combating digital identity fraud is a never-ending challenge.

 

Network Resilience vs. Cyber Resilience

Network resilience and cyber resilience are similar but different, says Wayne Lloyd, RedSeal chief technology officer. Credit: Gerd Altmann/Pixabay

Our attack surface and complexity are only expanding as commercial, government and Defense Department networks modernize and move to the cloud and software-defined networks.

 

Cellphone Assured Identity Solution Offers Promise

A sensitive compartmented information facility may no longer be a fortress that bars entry to cellphones. Credit; Shutterstock/Andrea Crisante

Mobile technology is not always available to military or government personnel in all environments, but new solutions could enable its use in secure facilities.




Cyber Resources

NIST: 800-160 (2) AND 800-171 (B) SECURING HIGH VALUE ASSETS AND CONFIDENTIAL UNCLASSIFIED INFORMATION

The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respective ...
 

Daedalus Enterprise Search Appliance

Department of Defense agencies are using Elasticsearch for a variety of workloads, ranging from cybersecurity to logistics. These organizations require a secure, simple to deploy enterprise platform t ...
 

The U.S. Cybersecurity Industrial Base and National Security

This white paper conveys to U.S. national security policy makers and decision makers observations and recommendations regarding the nation's cybersecurity industrial base and this sector's ability to ...
 

The Cyber Edge January 2020

FBI Strives to Keep Ahead of Cyber Adversaries.
A rapidly changing threat environment compels increased cooperation. ...
 

Will Your Security Solution Fit the New CMMC Framework?

The Cybersecurity Maturity Model Certification (CMMC) promises to have significant impact on the state of cybersecurity requirements for US DIB contractors. Each member of the DIB supply chain plays a ...
 

NIST: 800-160(2) and 800-171(B) Securing High Value Assets and Confidential Unclassified Information

The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respective ...
 

The Cyber Edge October 2019

Cyber policy traditionally has focused more on enterprise networks than tactical systems, according to Nancy Kreidler, the Army's new leader for the Cybersecurity and Information Assurance Directorate ...
 

More from the Resource Library ...


AFCEA Corporate Member CYBER Directory

 
AFCEA corporate membership required to be listed in the directory. Not listed? Join Now!


Enjoyed this article? SUBSCRIBE NOW to keep the content flowing.