Resource Library:

AFCEA's trusted Resource Library offers a wide range of white papers, e-books, case studies, executive videos and analytical content. These documents may be relevant to your work and of interest to you as a member of the global cyber, defense, security, intelligence and technology communities. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact our advertising department by phone (703) 631-6181 or email or your SIGNAL account executive.

Filter the library by ...

   

2024 Global Threat Report
Provided By: CrowdStrike   Send Email to POC   View Content   Mar 2024
CrowdStrike is tracking 230+ adversaries and noting a record eCrime breakout time, the 2024 Global Threat Report unveils an alarming rise in covert activity and a cyber threat landscape dominated by stealth. Significant threat gains in data theft, cloud breaches, and malware-free attacks, show that despite advancements in detection technology, adversaries continue to adapt.

TAC: An Outpost for Government & Industry Technology Collaboration
Provided By: Technology Advancement Center (TAC)   Send Email to POC   View Content   Feb 2024
Our latest SIGNAL Executive Video Series features TAC, a nonprofit focused on innovation in the technology and cybersecurity space. TAC is committed to serving as a leading source of government-industry collaboration. Learn how it is achieving this mission and the different solutions TAC offers the community.

Agile & Secure: Power Your Missions with SealingTech
Provided By: SealingTech   Send Email to POC   View Content   Feb 2024
Don't compromise on security. Unleash the full potential of your missions with SealingTech's expert-built cybersecurity tools and solutions.

Achieving Zero-Trust Architecture: Culture Eats Strategy For Breakfast
Provided By: AFCEA   Send Email to POC   View Content   Jan 2024
Zero-trust architecture is often described as more of a cultural challenge than a technical one. "Never trust ... Always verify" is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. AFCEA's Cyber Committee tackles this topic in this white paper.

Quantum Resistant Encryption Emerges as Crucial Cybersecurity Solution for Federal Agencies
Provided By: Palo Alto   Send Email to POC   View Content   Nov 2023
In our latest SIGNAL Executive Video Series, we learn how cybersecurity experts are working on stronger, quantum-resistant encryption to safeguard against powerful technology that will be able to break keys in seconds that would take traditional computers millennia.

The Cybersecurity Of Artificial Intelligence
Provided By: Ortman Consulting   Send Email to POC   View Content   Nov 2023
This topic paper explores the complexity and criticality of the cyber threats, vulnerabilities and respective defenses of Artificial Intelligence (AI). The following sections address the Advanced Persistent Threat (APT) as the principle adversary of concern for AI. Follow-on sections track the evolution of AI from fledgling information technology to cornerstone components of our global society's IT infrastructure, intrinsic vulnerabilities baked into these technologies, and the most appropriate defenses that should be explored and employed in the face of these threats a ...

Threat Intelligence Helps Counter Cyber Adversaries
Provided By: CrowdStrike   Send Email to POC   View Content   Oct 2023
Today's cyber environment is a race between threat actors and organizations' information technology security staff trying to keep ahead of the next vulnerability. One valuable tool against online aggression from state and criminal actors is intelligence- getting the right information about threats and knowing when to act.

5 Keys to Securing DOD Communications
Provided By: AWS Wickr   Send Email to POC   View Content   Oct 2023
Messaging is changing the way the whole world communicates, and for the United States Department of Defense (DOD), it is vital. Today's DOD must securely collaborate and communicate with contractors, coalition partners, field operations officers, and others without putting their critical data at risk. Whether their teams are in the field, at the base, or at home, standard communication apps can introduce risk. The 5 Keys to Securing DOD Communications eBook was developed to detail five ways the DOD can secure its messaging, better manage and control communications, and ...

Case Study: Enhancing Cybersecurity in Low-Bandwidth Environments
Provided By: SealingTech   Send Email to POC   View Content   Oct 2023
Seeking a game-changing solution that ensures your network remains secure? In SealingTech's latest case study, learn how an outside organization used an innovative dynamic duo (an all-in-one Security Onion sensor and analytic platform configured on the SN 8000) to make incident investigation and forensic analysis easier and more efficient.

Digital Transformation: A Bit More than Automation and Technology
Provided By: AFCEA   Send Email to POC   View Content   Sep 2023
Digital tools have transformed how we live, work and play. Public and private sector organizations are using high tech tools such as artificial intelligence, machine learning and cloud computing to remain competitive in the digital race for enhanced connectivity and capability. Members of AFCEA International's Cyber Committee chose this fascinating topic to explore and collect insights from successful leaders who represent the public and private sectors. In this white paper, authors reviewed their approaches, challenges, failures, lessons learned and successes on their ...

AFCEA TechNet Augusta 2023 Solutions Showcase
Provided By: AFCEA   Send Email to POC   View Content   Sep 2023
The U.S. Army Cyber Center of Excellence sought solutions to address both emerging and existing challenges. Several dozen abstracts were submitted to address the Problem Statements with the top solutions presented in the Innovation Theater at TechNet Augusta 2023.

A Cyber Curriculum for a Digital Workforce
Provided By: AFCEA   Send Email to POC   View Content   Sep 2023
Cyber is increasingly important in today's digital world. The need for skilled cyber professionals who can protect our digital infrastructure and data from cyber threats has never been greater. However, the demand for professionals far outstrips the supply, and there is a growing skills gap in the cybersecurity workforce. In this white paper written by members of AFCEA International's Cyber Committee, readers get a sample cybersecurity curriculum designed to cover a range of topics and provide students with a comprehensive understanding of cybersecurity.

2023 CrowdStrike Global Threat Report
Provided By: CrowdStrike   Send Email to POC   View Content   Aug 2023
2022 was a year of explosive, adaptive and damaging threats. Adversaries continue to be relentless in their attacks as they become faster and more sophisticated. CrowdStrike's 2023 Global Threat Report uncovers notable themes, trends and events across the cyber threat landscape.

Next-Generation Cyber: Maximizing Threat Intelligence and Driving Organizational Resiliency
Provided By: AFCEA   Send Email to POC   View Content   Aug 2023
As our dependence on technology continues to grow, so does the vulnerability to cyber threats. The threat landscape is rapidly evolving, and it is essential for organizations to adopt measures to mitigate the impact of cyberattacks. Cyber resiliency refers to the ability of an organization to continue operating in the face of cyber incidents. It is a critical aspect of any cybersecurity strategy and involves a combination of preventive and reactive measures. AFCEA's Cyber Committee presents this whitepaper that discusses the key components of next-generation cyber, cybe ...

Threat Insights Report
Provided By: Poly   Send Email to POC   View Content   Aug 2023
Each quarter our security experts highlight notable malware campaigns, trends and techniques identified by HP Wolf Security. By isolating threats that have evaded
detection tools and made it to endpoints, HP Wolf Security gives an insight into the latest techniques cybercriminals use, equipping security teams with the knowledge to combat emerging threats and improve their security postures.

5G: Building the Environment for JADC2 Success
Provided By: Nokia   Send Email to POC   View Content   Aug 2023
The government is designing policies to support and complement its strengths, innovating and investing in network technologies from commercial vendors that are investing billions of dollars in 5G, private wireless, tactical private wireless and more. For instance, the Commercial Solutions for Classified (CSfC) program established several years ago by the National Security Agency, is leveraging commercial technologies and products to deliver cybersecurity solutions quickly for the Department of Defense (DoD) and the intelligence community.

Securing Government Desktops from Cyber Threats with the Latest Belkin Secure KVM Technology
Provided By: Belkin International   Send Email to POC   View Content   Aug 2023
Terrorists and cyber criminals view federal, state, and local government IT infrastructure as an extremely attractive target for disruption, attacks, and data theft. Attacks have taken down entire systems, destroyed valuable equipment, and left many government agencies repeatedly vulnerable in countries worldwide. For the past 30 years, Belkin has worked with Information Assurance and Technology directors and strategic application personnel in federal work environments. Its SKVM switch solution is NIAP-listed and approved to the latest SKVM testing standard NIAP PP 4.0. ...

The Cyber Edge July 2023
Provided By: AFCEA   Send Email to POC   View Content   Jul 2023
Learn about the how the State Department is improving its Cyber State, new offensive cyber opeartions, and how Security Force Assitance Command is blazing Army network trails.

Engineering Effective Network Detection and Response for the Enterprise
Provided By: OpenText   Send Email to POC   View Content   Jul 2023
Network security engineers and architects face numerous challenges in complex enterprises, equipping the security operations center (SOC) with valuable tools to defend against sophisticated cyber adversaries. Network detection and response (NDR) is an important part of network security, and it involves using various tools and techniques to detect, analyze and respond to threats on a network.

5G: Bringing Bandwidth to the Tip of the Spear
Provided By: Nokia   Send Email to POC   View Content   Jun 2023
Today, the ubiquity of information technology in the military is transforming the communication function itself. The U.S. military has moved to an interconnected battlespace, where data needs to move seamlessly between air, land, sea, space and cyber in real time. That means there is a need for internet bandwidth, capable of supporting ultra-high data demands-a 5G-powered network.

  NEXT PAGE >>
RSS Feed