The Cyber Edge Sponsored

The Cyber Edge Home Page

September 1, 2021

At Guidehouse, we pride ourselves on a collaborative approach to solving society’s most complex challenges. As one of the largest consultancies in the world, we work side-by-side with our public sector and commercial clients to advance strategic thinking and build trust in society.

We help clients address their toughest challenges with a focus on markets and clients facing transformational change, technology-driven innovation, and significant regulatory pressure. Across a range of advisory, consulting, outsourcing, and technology/analytics services, we help clients create scalable, innovative solutions that prepare them for future growth and success.


August 1, 2021

“Never Trust, Always Verify”: that’s the essence of Zero Trust security. But to be effective, agencies need to validate more than just their users. Tanium can help you validate devices too.

With Tanium’s comprehensive endpoint visibility and control, you can collect real-time data to authenticate devices within zero-trust models. This will help close vulnerabilities, improve cyber hygiene and raise the barrier to entry into your network.

Tanium is the ideal partner for your Zero Trust journey. Visit to learn more.

May 11, 2021

Coordination among allied militaries is one of the world’s oldest problems. In the future, U.S. forces will likely operate in increasingly complex environments alongside diverse multinational forces to address emerging threats. Coalition command structures will require warfighting capabilities built on interoperability and a secure environment for communication and collaboration among trusted coalition forces at operational and tactical levels.

May 1, 2021
By Michael Campanelli

Before 1957, man had never placed a single object in space. Soon, tens of thousands of new artificial satellites will circle the Earth. Beyond a change in the sheer volume of satellites in space, the actors at center stage today are fundamentally different: a shift from humans and hardware to software and shoebox satellites.

A new space race is dawning. Luckily, the United States has an edge against competitors like China and Russia if it can keep it.

April 1, 2021

Working from home or remotely has always been a significant challenge for our federal workforce. The obstacles are not so much technical, rather it is the sensitivity of the data and communications that must traverse the network, and the sophistication, resources and determination of the adversarial powers that seek to disrupt or compromise them.

Unlike the commercial marketplace where a security breech might result in lost revenue, stolen IP or a fine, in the federal mission space the cost of failure could be the loss of critical infrastructure or even loss of life.

March 23, 2021

With ransomware and malware attacks on the rise across the globe, leaders need to be positioned for incident response before a breach occurs. Most businesses are not prepared for the earth-splitting impact a ransomware attack will present to their organization. Many organizations are deploying the “HOPE” strategy against ransomware. They hope every day that they aren’t targeted, because they know a ransomware attack will present a monumental financial and organizational challenge. Commercial businesses have paid hundreds of millions of dollars to black hat hackers for the rights to the decryption key to restore their network. Ransomware can shut down computers and lock out users until they pay hackers a ransom.

February 8, 2021

Federal agencies and especially the DOD are quickly embracing cloud computing for many IT requirements. Traditional computing paradigms are giving way to distributed computing that is fundamental to the dynamic and ephemeral cloud environment. At the same time, the user base is also becoming much more distributed, particularly in this era of increased remote work. Teams of globally dispersed personnel from the DOD, partner organizations and even supporting contractors are now regularly leveraging the cloud to share information critical to mission fulfillment.

February 1, 2021

DevSecOps is being used to implement cyber hardening solutions that secure deployed, operational platforms and industrial control systems (ICS) against cyber threat actors. Work in vulnerability analysis and applied artificial intelligence (Ai) tool development enables streamlined threat mitigation and cyber hardening of Joint All Domain Operations (JADO) platforms and systems of the future. Learn more about how commercial algorithm innovations and government technology stacks are being combined to create rapidly fielded, integrated and accredited solutions here:


September 29, 2020

The ability to perform data science at the edge is growing increasingly important for organizations across the public sector. From smart traffic cameras to hospitals using data processing for faster diagnosis and warfighters leveraging data in theater, the need to derive actionable intelligence at the edge has never been greater.

Gartner researchers predict that by 2025 three quarters of enterprise-generated data will be created and processed at the edge, outside of a traditional data center or cloud. Fulfilling the promise of real-time edge data processing and analysis requires significant intelligence and computational horsepower that’s close to the action.

September 29, 2020
By Ned Miller, Chief Technical Strategist, McAfee U.S. Public Sector

Over the last few months, Zero Trust Architecture (ZTA) conversations have been top-of-mind across the DoD. We have been hearing the chatter during industry events all while sharing conflicting interpretations and using various definitions. In a sense, there is an uncertainty around how the security model can and should work. From the chatter, one thing is clear—we need more time. Time to settle in on just how quickly mission owners can classify a comprehensive and all-inclusive acceptable definition of Zero Trust Architecture.

September 9, 2020

Federal agencies and especially the DOD are quickly embracing cloud computing for many IT requirements. Traditional computing paradigms are giving way to distributed computing that is fundamental to the dynamic and ephemeral cloud environment.

At the same time, the user base is also becoming much more distributed, particularly in this era of increased remote work. Teams of globally dispersed personnel from the DOD, partner organizations and even supporting contractors are now regularly leveraging the cloud to share information critical to mission fulfillment.

July 21, 2020

Enterprise modernization of the Navy's networks and systems is finally underway. Set to impact hundreds of thousands of uniformed and civilian users, it will consolidate many outsourced network service delivery mechanisms across the entire Department of the Navy (DON). The initiative aims to transform how services are delivered, provide a dramatically improved end user experience, and enable critical innovations long needed to accelerate the DON’s mission.

June 17, 2020

The one constant of cybersecurity is its rate of change. The technology you knew yesterday was acquired, bundled and updated into a consolidated tool that provides the solution for today. That consolidation is inevitable given the breadth of solutions and vendors working to address always-shifting security operations requirements. Not all segments of cybersecurity are responding equally to consolidation though. In particular, a critical segment that is long overdue, the security operations center (SOC), has not undergone its shift—yet.  

May 28, 2020

Zero Trust, a strategic security model to “never trust, always verify,” centers on preventing successful breaches by eliminating the whole concept of trust from an organization’s digital environment; instead, everything must be proven. 

May 4, 2020


For decades, Type 1 has been the National Security Agency’s most prized cybersecurity designation, describing technology that can effectively keep the nation’s most classified information under lock and key.

Recent years, however, have seen the growth of NSA’s Commercial Solutions for Classified (CSfC) program, which offers an alternative to Type 1 products.

With these two competing options, it is important to understand what the difference between Type 1 and CSfC really is and which one is best for your use case. 

Below, we’ll discuss everything you need to know about both NSA Type 1 and the CSfC program.

What Is NSA Type 1 Equipment?

November 1, 2019

Defense Industrial Base (DIB) supply chain cyber attacks are more widespread than ever due to multiple vulnerabilities. Government agencies require complete assurance that all entry points to their networks are fully secured. Meanwhile, supply chain vendors struggle with the quandary of how to ensure robust security without large investment dollars and without compromising daily operations.

The DoD Agency Secures Its Supply Chain case study is your comprehensive resource for identifying weaknesses within the supply chain and selecting the best solutions to keep your organization’s data secure.

August 2, 2019
Credit: Shutterstock/jijomathaidesigners

There was massive technological growth in 2018; things like artificial intelligence and blockchain have gained much support recently. IT departments often enable improved efficiency and security in their organizations by adopting emerging technologies, but that's only if they have the freedom to do so. A few years ago, IT had very less influence over business decisions, but now times are changing: IT is gaining an increased role in business decisions with implementation of cloud computing, data centres and enterprise mobility.

May 13, 2019

Hypersonic flight introduces fundamental changes to the way today’s missiles operate. Cruise missiles fly and maneuver within the atmosphere across a range of altitudes, but at speeds barely reaching Mach 1. Ballistic missiles have speeds of up to Mach 9 during re-entry from space but their trajectory is fixed. Vastly faster than cruise missiles, yet following an unpredictable and adjustable flight path, hypersonic missiles are a unique threat.

May 1, 2019

For military intelligent sensor systems constrained by size, weight and power (SWaP), custom microelectronic processing devices using advanced 3D packaging and thermal management are the only solution for success.

May 1, 2019

Deception changes the asymmetry against attackers with attractive traps and lures designed to deceive and detect attackers. Providing an active defense for early detection, forensics, and automated incident response to in-network threats is a must. The ThreatDefend™ Platform provides accurate threat detection within user networks, data centers, clouds, and specialized attack surfaces. The portfolio includes expansive network, endpoint, application, and data deceptions that misdirect and reveal attacks from all threat vectors. Advanced machine-learning makes deployment and operations simple to operate for organizations of all sizes.

May 1, 2018

As the need for more sensor processing and embedded security continues to grow in defense applications such as unmanned systems and munitions, the footprint for these mission-critical systems continues to shrink. A fundamental shift in microelectronics design and packaging is required to address the needs of the modern threat environment where non-invasive attacks are imminent.

December 4, 2018

Today’s government missions and challenges are more complex and larger in scale than ever before, and they require informed, data-driven solutions, approaches and insights. DoD must be able to tap into the power of data to solve mission challenges, realize new degrees of operational efficiency and remain relevant in an information-rich world.

April 2, 2018

Recent initiatives by the National Security Agency (NSA) have enabled alternatives to Type 1 security solutions by leveraging commercial technologies in a layered approach, thus saving time and money for classified programs. The Commercial Solutions for Classified (CSfC) Program provides solution level specifications called Capability Packages (CP) to deliver data security solutions using approved components from leaders in commercial technology. In the Data at Rest CP data protection can be accomplished by integrating an inner and outer layer of hardware and software encryption where a self-encrypting solid state drive is the inner layer and either a file encryption or software full disk encryption solution would be the outer layer.

October 16, 2017
By Rick McElroy

Your endpoints don’t just live within the safety of your corporate network—they’re out in the wild exposed to millions of new threats every day. With non-malware attacks on the rise that are even harder to detect than traditional malware, security professionals are realizing it is no longer a matter of if they will be breached, but when.

May 30, 2017
By Rick McElroy

As you are probably aware, there was a new interesting phishing attack that started in May.

“The vulnerability was exposed for only about one hour, and a spokesperson told NBC News that it affected “fewer than 0.1 percent of Gmail users” — which would still be about 1 million.”

In a nutshell the attack worked like this:

You receive a link from one of your contacts sharing out a Google doc.

April 6, 2017
By Ryan Murphy
Former FBI operative Eric O'Neill is Carbon Black’s national security strategist.

As Carbon Black’s national security strategist, Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters. He is a practicing attorney who specializes in cybersecurity vulnerability assessments, counterintelligence and counter terrorism operations, investigations into economic espionage, internal investigations and security risk assessment consulting.

April 6, 2017

Increasingly, cyberattackers have been leveraging “non-malware” attack methods to target vulnerable organizations. Recently, the Carbon Black Threat Research Team was alerted about such an attack by a partner’s incident response (IR) team. The attack ultimately compromised accounts and stole research and intellectual property.

In this specific attack, a malicious Excel document was used to create a PowerShell script, which then used the Domain Name System (DNS) to communicate with an Internet Command and Control (C2) server.

This attack method prompts three key questions for organizations looking to defend themselves against non-malware attacks, namely:

March 31, 2017
By Sandra Jontz

For all the talk about how hard it is to crack the cybersecurity code, what if the dialogue shifted?

What if technologists were given the right economic incentives to solve the problem? What if, instead of droning on about poor cyber hygiene practices, users weren’t treated like they are the problem but the solution? 

By George I. Seffers

The AFCEA Cyber Committee, which is made up of more than 40 experts in the field, has released a white paper identifying key concerns in the cyber realm and offering recommendations for the incoming administration.

The report, Key Cyber Issues and Recommendations: A Way Forward, identifies three needs in the cyber arena. The first is that the United States must approach cyber in a strategic and international context that incorporates diplomatic, information, military and economic elements of national power.

By Sandra Jontz

Better cooperation and enhanced information sharing between the government and industry will go a long way toward safeguarding digital networks and building up the work force needed to protect the information infrastructure. These are some of the recommendations offered by the nonpartisan Commission on Enhancing National Cybersecurity in its much-anticipated report released this month.