Resource Library

Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Marsha Carpenter by phone (703) 631-6181 or Email or your SIGNAL account executive.

Web Security and the OWASP Top 10: The Big Picture
Author: Plural Sight   Send Email to POC   View Content
Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and corporate security. The Open Web Application Security Project gives us the OWASP Top 10 to help guide the secure development of online applications and defend against these threats. This course takes you through a very well-structured, evidence-based prioritization of risks and most importantly, how organizations building software for the web can protect against them.

Easing the Burden of Records Management: Automating Records Capture
Author: Kofax, Inc.   Send Email to POC   View Content
Deadlines are looming for all U.S. Federal Agencies to implement and demonstrate their compliance with the 2012 Directive (M-12-18) from OMB/NARA, mandating electronic record keeping by 2019. Capture and categorization in relation to electronic records management is the greatest burden for the user community. Download this AIIM white paper to learn strategies to comply with these mandates while maximizing operational efficiency.

Mitigating the Risks of Privilege-based Attacks in Federal Agencies
Author: Beyond Trust   Send Email to POC   View Content
Stay current in the compliance landscape and protect government information networks from internal and external threats. The most effective approach with end users involves restricting access privileges through both policy and technology methods, allowing the least possible privilege for every user. This is the domain of Beyond Trust's PowerBroker privileged account management (PAM) solutions. Using a least-privilege approach, users receive permissions only to the systems, applications, and data they need based on their current role or profile in the agency.

The Security Implications of the Internet of Things
Author: AFCEA   Send Email to POC   View Content
The Internet of Things (IoT) comprises creative products that connect healthcare, home energy consumption, mass transit, insurance, and almost every economic sector. With these new devices, we have infinitely more opportunities, yet little consideration is being paid to the cyber security of this phenomenon. Once consumers introduce the IoT into their lives, machine-to-machine interactions begin on their behalf. Assumptions about privacy and protections need to be considered now, before the massive rollout. The implications of the IoT are significant, and nothing short ...

Using Wider, Deeper Views of Elusive Signals to Characterize Complex Systems and Environments
Author: Keysight   Send Email to POC   View Content
For decades, spectrum analyzers were used in the development and characterization of radar and electronic warfare (EW) systems. However, traditional swept measurements have become insufficient, as most modern radar systems are adaptive, requiring significantly more speed, flexibility, and performance. Today's best alternative is a signal analyzer equipped with real-time spectrum analysis (RTSA) coupled with vector signal analysis (VSA) software. Learn techniques for monitoring EW scenarios, identifying unwanted spectral events, or issues in transmitted signals.

Author: AFCEA, Sponsored by FireEye and Owl Computing Technologies, Inc.   Send Email to POC   View Content
Cybersecurity is becoming the defining element of information system success. Where capabilities and services once ruled, safety now is looming as the most important aspect of a network or information storage system. Since its origins as an afterthought, cybersecurity has moved up the ladder to hold veto power over the use of a new capability.

Big Data
Author: AFCEA   Send Email to POC   View Content
Big data is on every network managers lips as systems and operations are re-shaped to take advantage of this information wellspring. This EBook contains valuable insight on some of the big data initiatives underway and the technology involved as covered by SIGNAL Media.