Resource Library:
AFCEA's trusted Resource Library offers a wide range of white papers, e-books, case studies, executive videos and analytical content. These documents may be relevant to your work and of interest to you as a member of the global cyber, defense, security, intelligence and technology communities. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
For information regarding posting content in the Resource Library, please contact our advertising department by phone (703) 631-6181 or email or your SIGNAL account executive.
Filter the library by ...
Advancing Cyber Warfighter Efficiency Through Powerful Defensive Solutions
Provided By: SealingTech

Jun 2025
In our latest SIGNAL Media Executive Video Series, we learn from SealingTech experts Andres Giraldo and Dave Shortt about the company's efforts to support the nation's warfighters' cyber missions at scale and with optimal efficiency. Learn more: SealingTech.com/missionsuccess
Hunt the Cyber Threat— Before It Hunts You
Provided By: CrowdStrike

May 2025
The modern cyber threat landscape is quickly evolving. Today's adversaries are scaling their operations, streamlining their
tactics, and recycling and evolving their successful techniques to gain speed and stealth.
Bringing Overmatch to Battlefield Communications
Provided By: Nokia

May 2025
In today's military doctrine, there are five key domains of warfare. Land, sea and air are well recognized and kinetic in nature; two-space and cyberspace-are products of technological Innovation over the past 80 years or so. The Soviet launch of Sputnik in 1957 marked the beginning of the space race, while the U.S. Joint Chiefs of Staff declared cyberspace a domain of conflict in the 2004 National Military Strategy.
AI Adoption and Enhancing National Security
Provided By: Microsoft

Apr 2025
In our latest SIGNAL Media Executive Video Series, we learn from Leigh Madden, vice president, National Security Group, Microsoft, about AI adoption and enhancing national security.
The Cyber Edge April 2025
Provided By: AFCEA

Apr 2025
In the April issue of the Cyber Edge, learn about the significance of cybersecurity in global health as well as the imperatives for meeting risk management for industry classified facilities and information technology.
Secure By Design—Next Steps
Provided By: AFCEA

Apr 2025
Every 11 seconds, a ransomware attack occurs, crippling businesses, delaying critical medical procedures and even threatening national security. Despite decades of advancements in technology, software systems remain shockingly vulnerable. In this white paper prepared by AFCEA;s Cyber Committee, author write that with a global community increasingly dependent on software, we cannot afford to delay moving forward to dramatically improve software quality and robustness. The nation's fundamental standard of living is at risk. Download to read about the research that shows a ...
For Pentagon's AI Programs, It's Time for Boots on the Ground
Provided By: Microsoft

Apr 2025
The Department of Defense (DoD) has spent years carefully studying, researching and experimenting with artificial intelligence (AI), alongside some operational successes like Project Maven that leveraged AI for warfighting. But the time is now for more boots on the ground. To accelerate the adoption of AI, the department needs to start slogging through the mud to scale the implementation of additional high-priority use cases.
Protect Your Company From the CMMC Iceberg
Provided By: Soundway

Apr 2025
There are approximately 300,000 companies that comprise what the Department of Defense (DoD) calls the Defense Industrial Base (DIB). Most are small and mid-sized companies, a significant number of which depend on DoD contracts and subcontracts for their financial well-being. Many are potentially sailing straight for an iceberg. The iceberg has a name- the Cybersecurity Maturity Model Certification (CMMC) program.
BUSINESS ACTIVITY INTELLIGENCE (BIZINT) IN ACTION
Provided By: Moody's

Apr 2025
By leveraging publicly available or accessible data, investigators can follow bad actors who are unwittingly leaving footprints in public records. This is known as business activity intelligence (BizINT). A form of open source intelligence (OSINT), BizINT leverages organic economic and commercial data to provide an “honest broker” lens on indicators of fraud and other wrongdoing: it represents the paper trail left behind when societal norms compel bad actors to participate in professional and revenue-producing activities – or to use recognized instruments and mechanisms ...
The Cyber Edge January 2025
Provided By: AFCEA

Jan 2025
For the January 2025 issue of the Cyber Edge we cover combating cyber vulnerabilities, cybercore's focus on the critical infrastructure cyber battlespace, and the silent vulnerabilities of operational technology.
WEST 2025 Innovation Showcase
Provided By: AFCEA

Jan 2025
Sea Service leaders today confront profound and rapidly changing threats in a landscape of increasingly complex challenges. During the WEST 2025 conference, January 38-30, 2025, experts explored the depths of the unique issues our warfighters confront, and worked to answer the conference theme question: "are we advancing operational capabilities that pace the threat?" Some of those answers could be unveiled in this Innovation Showcase compendium where innovators demonstrate cutting-edge solutions.
Automating Geographic Content
Provided By: Hexagon

Nov 2024
This paper will look at geographic data and software and their uses within IAMD. Examples from recent CUAS exercises, updates on what's possible with commercial off-the-shelf software and customer experience in various air defence systems will be examined.
Future-proof C6IS5 Systems
Provided By: Hexagon

Nov 2024
Technology has drastically altered the nature of conflicts, and vice versa. Evolving threats such as the proliferation of different forms of terrorism and growing geopolitical tensions around the world mean C6ISR (command, control, communications, computers, cyber defense and combat systems and intelligence, surveillance and reconnaissance) capabilities are needed to
improve situational awareness, provide secure and faster communications and accelerate threat detection.
National Innovation Strategy
Provided By: AFCEA

Nov 2024
In an effort to reach U.S. entities and the highest levels of government with recommendations for making the United States a top competitor in global innovation, AFCEA International's Cyber Committee developed its National Innovation Strategy (NIS) proposal that addresses challenges and amplifies emerging opportunities for fostering a more robust innovation ecosystem in the United States. The proposal emphasizes the crucial role of innovation in strengthening national security, economic prosperity and societal well-being.
2024 TechNet Indo-Pacific Innovation Showcase
Provided By: AFCEA

Nov 2024
It's well known that China is expanding its diplomatic reach and targeting strategically important countries and sectors to pursue its agenda and attempt to impose its signature coercive tactics outside of international norms to extend its influence for the benefit of the Chinese Communist Party. IndoPacific partners in democracy also are stepping up diplomatic efforts. But governments can't solve the technology issues alone, which is why submissions by our industry support partners, such as the ones offered in this compendium, are so important.The Innovation Showcase p ...
Standing Up to Disinformation and Its Unprecedented Threats
Provided By: Janes

Nov 2024
The enduring curse of the internet era may turn out to be the flood of misinformation and disinformation that deludes citizens, weakens institutions and creates a framework for violence. It might not be possible to stop the spread of harmful, hurtful lies, innuendoes and half-truths, but government agencies and military services can at least strive to clear out the smoke, discern the truth, educate the public and act on factual information.
Digital Transformation in Defense
Provided By: Hexagon

Nov 2024
The modern battlefield is a rapidly evolving landscape. While digitalisation has transformed our daily lives, some defence organisations haven't kept pace. This leaves them vulnerable, as highlighted by NATO's call for urgent "digital transformation for NATO military forces." This white paper explores why digital transformation is essential for modern defence. We'll examine the limitations of traditional systems and how digital tools, data and processes can unlock significant advantages.
Navigating the Future of Cybersecurity with Artificial Intelligence
Provided By: AFCEA

Oct 2024
In a rapidly evolving digital landscape, cybersecurity is no longer solely a concern for the military and private sectors; it is also critically important for civilian government agencies. As cybersecurity threats grow more sophisticated, leveraging artificial intelligence (AI) becomes essential for protecting vital civilian infrastructure and services. This white paper, developed by the AFCEA International Cyber Committee, examines the transformative role of AI in enhancing cybersecurity across all sectors in the United States, and provides a comparative analysis of AI ...
Empowering Troops, Enhancing Battlespace Awareness With Private Wireless
Provided By: Nokia

Oct 2024
The advent of 5G technology already enables high bandwidth data communications throughout civil society. Less recognized is that private wireless is having a significant impact on modern warfare, fundamentally changing how battles are fought. Dedicated, secure communication infrastructure can empower troops on the ground and revolutionize situational awareness through real-time data sharing, improved sensor integration and advanced augmented reality. The Department of Defense (DoD) is exploring the many ways 5G technology can be leveraged in the battlespace.