Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Aligning with the Critical Security Controls to Achieve Quick Security Wins
Author: Carbon Black   Send Email to POC   View Content
Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions that tackle hacking, the Center for Internet Security Critical Security Controls for Effective Cyber Defense offers guidance for prioritizing security processes, and standardization and automation are among its 20 Critical Security Controls derived from frameworks such as NIST SP 800-53. Carbon Black experts describe some of the simple defense measures your organization eas ...

Network Visibility for Dummies
Author: Ixia   Send Email to POC   View Content
You are responsible for your organization's network security and performance management and the concept of network visibility has been introduced to you. But what is Network Visibility? How does it help you optimize performance and keep your network defenses strong? Download this e-book to learn how to use a visibility foundation to access all traffic, and protect and deliver the information you need for a great customer experience.

Using Agile to Deliver Customer Value and Drive Stakeholder Collaboration: Successful Solutions through Agile Project Management
Author: TwentyEighty Strategy Execution   Send Email to POC   View Content
Although the Agile movement was the brainchild of the software development and IT world, it has grown and evolved. There is no question that today Agile project management can be, and has been, applied successfully to a broad range of projects. This mindset focuses on the delivery of value to the customer, rather than strict compliance to a rigorous set of procedures, and values inventiveness and innovation over predictability and unchanging processes. When implemented effectively, Agile drives a collaborative effort between the project team and end user where the focus ...

Threat Hunting For Dummies, Carbon Black Special Edition
Author: Carbon Black   Send Email to POC   View Content
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to "go on the hunt." This guide introduces the concept of threat hunting and the role it plays in the protection of your organization's systems and information.

Uncompromised Visibility and Security Performance
Author: Ixia   Send Email to POC   View Content
Today's IT staffs are challenged, dealing with the avalanche of big data and computing necessary to remain competitive. Uncompromised visibility, where the organization has end-to-end views of each and every critical packet, becomes a business imperative, with a best-in-class visibility platform enabling your security and performance tools to be much more effective.

In this paper, learn:
How to avoid "network blind spots" that increase the risk of security breaches and possible data loss with performance repercussions Which features on industry-standard networ ...

The Cyber Edge - April 2017
Author: AFCEA   Send Email to POC   View Content
The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M. Gilday, USN, describes the challenges facing the sea service in cyberspace.
- Research into quantum security already is leading to applications in that esoteric area.
- A new commercial approach to cybersecurity effectively renders a network invisible to attackers.
- Cyber warriors must change their tactics on the fly as adversaries continue to innovate.

A New Era in Close Air Support: Digital Situational Awareness for Dismounted Ground Forces
Author: ViaSat   Send Email to POC   View Content
Since the early days of World War I, forces have struggled with how to integrate air power to achieve decisive effects on the battlefield on the ground. The key issue that has remained constant for over one hundred years has been the difficulty in seamless communications between supporting aircraft and ground forces in order to establish a common understanding of the situation on the battlefield, locations of friendly and enemy forces, and the desired effects required by ground forces from their supporting aerial components.

With the advent of the Battlefield Awa ...

Cybersecurity - A Strategic Problem
Author: IT Cadre   Send Email to POC   View Content
Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a networked world. However, this improved productivity comes with new risk. For many organizations, information is the most valuable asset they possess. Their existence is tied to their ability to both use and protect this vital information. Protecting that information has to span the complex environments of corporate owned storage networks, individual workstations, cloud se ...

Guide to Securing the Everywhere Perimeter
Author: Avaya Government Solutions   Send Email to POC   View Content
Avaya delivers a solution set of next-generation capabilities that address the challenges of the everywhere perimeter. It provides a foundational layer that seamlessly manages hyper-segmentation, native stealth, and automatic elasticity across the organization. Using software-defined and identity technologies to automate onboarding and access from users, devices, networking nodes, and servers, Avaya makes protecting and managing everywhere access practical.

Drowning in Digital Data, Law Enforcement Moves to Team-Based Forensic Technology and Processes to Speed Up Investigations
Author: AccessData Group   Send Email to POC   View Content
This paper explores the complexities and challenges facing law enforcement in managing digital evidence as it makes its way through digital forensics and investigative workflows. We will discuss new approaches, emerging technology solutions and best practices for law enforcement professionals as they transform their capabilities to leverage digital data to bring criminals to justice.

Key Cyber Issues and Recommendations: A Way Forward
Author: AFCEA   Send Email to POC   View Content
Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve with respect to coordinated
cybersecurity readiness and response. The sheer size and number of agencies with their various systems, missions and legal mandates make it difficult to know how major cyber threats should be addressed and cyber events can be mitigated. Decisions on response actions are delayed or rejected due to lack of understanding on the consequences of th ...

A How to Guide to Predictive Analytics
Author: Ascolta, A Vion Company   Send Email to POC   View Content
Today's advanced predictive analytics reverses the historical paradigm of how we interact with data. In the past, data collected by businesses, governments and organizations has been analyzed in a forensic manner. In other words, the analysis is always looking back at what has occurred, without much capability to use the historical patterns in a predictive way. Make no mistake, this approach had some real benefits, but without the more sophisticated big data and analytic capabilities available today, the predictive element has been more guesswork than science until now.

Feds: You have a BYOD program whether you like it or not
Author: Lookout   Send Email to POC   View Content
Many agencies believe they aren't actually subject to cyber-threats from mobile devices because, simply, they don't currently allow personal mobile devices to access their networks. Ultimately, however, this posture puts the government and its data at risk because federal agencies have a BYOD program whether they like it or not. After analyzing 20 federal agencies, Lookout discovered 14,622 Lookout-enabled devices associated with government networks. That means people are connecting their phones to your systems. What's more is that the frequency of serious mobile threa ...

Public/Private Information Sharing
Author: AFCEA   Send Email to POC   View Content
This white paper captures some areas of great interest to the cyber community as represented by our sample of interviewees. There is no shortage of practical and achievable process improvement ideas. The overarching theme is that, with the correct and timely level of cooperation between the public and private sector, we can improve our response to cyber attacks and begin to better understand how the adversaries are attempting to position themselves in the ever-changing world of cyberspace.

Recommended Context and Framework for a National Cyber Information Sharing Initiative
Author: AFCEA   Send Email to POC   View Content
There has been increased public dialogue recently regarding the importance, potential benefits and urgency of sharing cyber-related information. The inference from much of the dialogue is
that information sharing is viewed as a primary means to improve the nation's cybersecurity posture. AFCEA's Cyber Committee has been evaluating the topic of information sharing. This paper provides additional recommendations for establishing the
standards and implementation of an effective National Information Sharing Infrastructure.

Pentesting: The Required Human Ingenuity to Uncover Security Gaps
Author: Spirent Federal   Send Email to POC   View Content
A penetration test (or more commonly, "pentest") is a software, infrastructure and or network attack on your organization by a skilled attack team that probes for security weaknesses and seeks to exploit them to reach your assets.

The testing team surveys the breadth of potential damage that can be done in an attack, and delivers a report, associating a level of risk with each vulnerability they discover. A pentest report helps an organization prioritize its security weaknesses and reduce risk.

Role of the Network in Creating a Path to the Cloud
Author: Juniper   Send Email to POC   View Content
Read this white paper to learn how federal agencies can create a tailored technology roadmap to support their eventual migration to the cloud, as well as the benefits of modernizing IT infrastructure to ease that transition. Government organizations can begin today by consolidating applications, simplifying IT operations, driving expanded automation, and gaining greater management control of networks to ensure more agile and trusted computing environments in the future.

Wolfspeed & Powerful Microwave Develop Reference Design Circuit for Wide Bandwidth, Low Frequency (50 1,000 MHz) Power Amplifier
Author: Wolfspeed   Send Email to POC   View Content
To demonstrate the performance advantages possible in wide bandwidth, low frequency power amplifiers through the use of gallium nitride (GaN) high electron mobility transistors (HEMTs), Wolfspeed and Powerful Microwave Ltd. developed an application circuit that uses two GaN HEMT power devices to obtain a power output of 100W over a frequency range of 50 MHz to 1,000 MHz.

Designed for high performance, wideband communications applications, VHF and UHF amplifiers built using GaN technology are ideal for public safety, tactical and secure military communications, tr ...

CommScope Infrastructure Solutions for the Federal Government Market
Author: CommScope   Send Email to POC   View Content
Can you trust your network when our national interests are on the line? CommScope engages all branches of the U.S. government and federal agencies with relevant network infrastructure solutions that securely support and modernize critical systems. Technology you deploy must provide accurate, secure, real-time information that protects our citizens & soldiers. We are committed to helping design & maintain a secure, joint network architecture that delivers actionable data based on highly mobile, smarter, faster digital services supporting U.S. government communications.

Optimize delivery of agency-critical apps to government branch offices
Author: Citrix   Send Email to POC   View Content
Agencies of all sizes rely on wide area networks (WANs) to connect branch offices to the datacenter and deliver the mission-critical applications their employees depend on. Maintaining high availability and quality of service is crucial as slow or dropped connections can have an immediate impact on productivity. MPLS typically offers high reliability but only at a high price, and can't be changed quickly to meet changing mission needs. Citrix offers a more reliable, cost-effective way to support users in every location with SD-WAN.