Resource Library:
AFCEA's trusted Resource Library offers a wide range of white papers, e-books, case studies, executive videos and analytical content. These documents may be relevant to your work and of interest to you as a member of the global cyber, defense, security, intelligence and technology communities. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
For information regarding posting content in the Resource Library, please contact our advertising department by phone (703) 631-6181 or email or your SIGNAL account executive.
Filter the library by ...
How Government Agencies Can Resolve IT Issues Before They Have Mission Impact
Provided By: Nexthink

Oct 2025
Federal and state government agencies face a daunting challenge to moderate resource consumption while serving the increasing needs of the public. Digital
transformation has put IT at the center of that challenge, being always asked to do more with less in the face of increasing support needs, leading to wasted resources, poor service delivery and frustrated staff. This ultimately affects the ability of an agency to carry out its mission
and the quality of the citizens' experience. Proactive IT leveraging Digital Experience Management is the most efficient way to ...
C2 Modernization with REDCOM's Adaptable Communications Ecosystem
Provided By: Redcom

Oct 2025
All branches of the U.S. military are aiming to modernize their command and control systems, and REDCOM's solutions are designed to address the systems' complex operational communication challenges, said John Kelliher, director of strategy and research and development at REDCOM. Watch our SIGNAL Media Executive Video to learn more about REDCOM's modernization efforts focused on reducing infrastructure and complexity.
The Cost of Doing Nothing: Why Public Sector (PS) Productivity Lags Behind Other Industries.
Provided By: Nexthink

Oct 2025
While private industries race ahead with AI and days-old innovations, Public Sector (PS) organizations remain bogged down
by aging systems, fragmented infrastructures, and a workforce struggling to adapt. Across the USA, UK, France, and Germany, technical debt, outdated tools, and slow modernization efforts are costing thousands of hours a week-undermining both employee productivity and public trust. But where most see struggle, we see opportunity. This report explores the root causes behind many of the criticisms
of the public sector, and where IT leaders can mak ...
The Proactive IT Handbook for Government Agencies
Provided By: Nexthink

Oct 2025
The ultimate measure of the work in IT is customer experience. IT cannot deliver a positive customer experience
without first delivering a positive employee experience to all who serve their agency's mission, especially those who have direct customer interaction. More and more federal and state government agencies have initiatives to deliver great employee experience with a focus on technology
because it is a prerequisite to delivering great outcomes, fulfilling the objectives of the mission, and putting people and citizens first.
VIRTUAL MACHINE ORCHESTRATOR
Provided By: Spectro Cloud

Aug 2025
The idea of "doing more with less" is an old-hat strategy government agencies use. Still, it has taken on a new urgency with the Department of Government Efficiency (DOGE) efforts to reduce the federal workforce and the Trump administration's plans to shrink most agencies' budgets in fiscal year 2026. Workforce and budget cuts don't change the goals: agencies still need to do their jobs, reduce cybersecurity risk and meet modernization mandates through digital transformation. The DOGE-driven changes, however, emphasize doing so efficiently. For agencies, that means find ...
Communications: Enabling Next-Generation Command and Control
Provided By: Nokia

Aug 2025
The future of defense communications relies on agile, secure and scalable networks that empower warfighters to dominate the information domain- even in the most contested and austere environments. As modern conflicts grow increasingly complex, the need for real-time adaptability, cyber resilience and seamless interoperability becomes mission critical.
Software Overlay Provides Identity-Based Security Layer to OSI Model
Provided By: IMPRES Technology Solutions

Aug 2025
As cybersecurity threats grow more sophisticated, traditional network architectures struggle to keep pace, especially in sectors reliant on legacy hardware. IMPRES Technology Solutions has introduced its Cybersecurity Operations Infrastructure (CSOI) offering, a timely software solution that inserts an overlay between two key layers in the OSI framework to determine authentication and authorization of traffic prior to allowing any access.
The Cyber Edge July 2025
Provided By: AFCEA

Aug 2025
Learn about modern day hackers, the DOD striving to revolutionize software acquisition, South America adopting zero-trust policies, and much more!
Advancing Cyber Warfighter Efficiency Through Powerful Defensive Solutions
Provided By: SealingTech

Jun 2025
In our latest SIGNAL Media Executive Video Series, we learn from SealingTech experts Andres Giraldo and Dave Shortt about the company's efforts to support the nation's warfighters' cyber missions at scale and with optimal efficiency. Learn more: SealingTech.com/missionsuccess
Bringing Overmatch to Battlefield Communications
Provided By: Nokia

May 2025
In today's military doctrine, there are five key domains of warfare. Land, sea and air are well recognized and kinetic in nature; two-space and cyberspace-are products of technological Innovation over the past 80 years or so. The Soviet launch of Sputnik in 1957 marked the beginning of the space race, while the U.S. Joint Chiefs of Staff declared cyberspace a domain of conflict in the 2004 National Military Strategy.
Hunt the Cyber Threat— Before It Hunts You
Provided By: CrowdStrike

May 2025
The modern cyber threat landscape is quickly evolving. Today's adversaries are scaling their operations, streamlining their
tactics, and recycling and evolving their successful techniques to gain speed and stealth.
AI Adoption and Enhancing National Security
Provided By: Microsoft

Apr 2025
In our latest SIGNAL Media Executive Video Series, we learn from Leigh Madden, vice president, National Security Group, Microsoft, about AI adoption and enhancing national security.
The Cyber Edge April 2025
Provided By: AFCEA

Apr 2025
In the April issue of the Cyber Edge, learn about the significance of cybersecurity in global health as well as the imperatives for meeting risk management for industry classified facilities and information technology.
Secure By Design—Next Steps
Provided By: AFCEA

Apr 2025
Every 11 seconds, a ransomware attack occurs, crippling businesses, delaying critical medical procedures and even threatening national security. Despite decades of advancements in technology, software systems remain shockingly vulnerable. In this white paper prepared by AFCEA's Cyber Committee, author write that with a global community increasingly dependent on software, we cannot afford to delay moving forward to dramatically improve software quality and robustness. The nation's fundamental standard of living is at risk. Download to read about the research that shows a ...
For Pentagon's AI Programs, It's Time for Boots on the Ground
Provided By: Microsoft

Apr 2025
The Department of Defense (DoD) has spent years carefully studying, researching and experimenting with artificial intelligence (AI), alongside some operational successes like Project Maven that leveraged AI for warfighting. But the time is now for more boots on the ground. To accelerate the adoption of AI, the department needs to start slogging through the mud to scale the implementation of additional high-priority use cases.
Protect Your Company From the CMMC Iceberg
Provided By: Soundway

Apr 2025
There are approximately 300,000 companies that comprise what the Department of Defense (DoD) calls the Defense Industrial Base (DIB). Most are small and mid-sized companies, a significant number of which depend on DoD contracts and subcontracts for their financial well-being. Many are potentially sailing straight for an iceberg. The iceberg has a name- the Cybersecurity Maturity Model Certification (CMMC) program.
BUSINESS ACTIVITY INTELLIGENCE (BIZINT) IN ACTION
Provided By: Moody's

Apr 2025
By leveraging publicly available or accessible data, investigators can follow bad actors who are unwittingly leaving footprints in public records. This is known as business activity intelligence (BizINT). A form of open source intelligence (OSINT), BizINT leverages organic economic and commercial data to provide an “honest broker” lens on indicators of fraud and other wrongdoing: it represents the paper trail left behind when societal norms compel bad actors to participate in professional and revenue-producing activities – or to use recognized instruments and mechanisms ...