Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Tactical UAV Security - Modernized Security for a Modernized Battlespace
Provided By: ViaSat, Inc.   Send Email to POC   View Content   May 2021
It is no secret that the world is experiencing unprecedented, exponential growth in technology and that militaries have an increasing need to modernize their weaponry, intel systems, and communications equipment for warfighters in the field. However, as the battlespace continues to be modernized, the threats continue to advance, and the integrity of communications and applications becomes a top priority. Learn the importance and keys to securing tactical UAVs.

Guide To Automatic Privileged Access Management
Provided By: Thycotic   Send Email to POC   View Content   May 2021
Organizations often have exponentially more privileged accounts than they have employees. As the number and diversity of privileged accounts increase, the attack surface expands, and there is simply no way to protect these sensitive accounts using only manual interventions. Trying to secure privileged accounts manually is resource-intensive, costly, and prone to human error. Facing a shortage of security skills, many organizations are understaffed, leading to increased workload, stress, and mistakes. Automation helps you accelerate and streamline activities to secure pr ...

Taking the First Steps for Privileged Access Management
Provided By: Thycotic   Send Email to POC   View Content   Apr 2021
Determining a security access management strategy is essential, but doing so is often delayed by over analysis and caution. Ross Johnson, director of federal sales for Thycotic Software Ltd, in a recent interview explains several ways to approach the problem efficiently, including taking inventory of data assets, examining audit processes and looking at lifecycle aspects.

Drinking From the Firehose
Provided By: Booz Allen   Send Email to POC   View Content   Apr 2021
How U.S. intelligence agencies can use
machine learning to beat data overload.

Recomposable Architectures
Provided By: Red Hat   Send Email to POC   View Content   Apr 2021
The Key to JADC2 Success

Connecting the Networked World
Provided By: LEMO   Send Email to POC   View Content   Apr 2021
LEMO makes the taken-for-granted components
that ensure connectivity time after time.

The Cyber Edge April 2021
Provided By: AFCEA   Send Email to POC   View Content   Apr 2021
The national security community needs to prepare
now for the possibility that U.S. adversaries could
be first to develop and deploy quantum computers, which would render useless most conventional
encryption algorithms, says Adrian Stanger, senior cryptographic authority, Cybersecurity Directorate, National
Security Agency (NSA).

PacStar IQ-Core Network Communications Manager
Provided By: PacStar   Send Email to POC   View Content   Apr 2021
IQ-Core NCM manages PacStar products and is also available for integration into customer-specified systems, OEM, and enterprise-class solutions.

PacStar IQ-Core Crypto Manager
Provided By: PacStar   Send Email to POC   View Content   Apr 2021
To enable mobility for warfighting, the National Security Agency (NSA) established a program (with a set of guidelines) called - Commercial Solutions for Classified- (CSfC). This program enables DoD and federal organizations to transmit classified information, up to Top Secret, using commercial-grade encryption solutions, eliminating the need for expensive, difficult-to-use classified equipment.

Zero Trust Architecture
Provided By: Quest/DLT   Send Email to POC   View Content   Apr 2021
Zero trust architecture is a cybersecurity concept that assumes a network is or will be compromised and takes steps to protect data at every potential point of access. But such a move, while very beneficial to the organization, is a complex and involved process that requires some fundamental changes in how security and operations are approached.

IQ-CoreĀ® Remote Operations and Management (ROAM)
Provided By: PacStar   Send Email to POC   View Content   Apr 2021
Increase your tactical network situational awareness and control to an entirely new level with IQ-Core ROAM. View your entire network through a single pane of glass, while sharing views and access to deployed operators at any echelon, to create a collaborative, hierarchical, network operations and management structure.

Protecting Agencies with a Comprehensive Security Plan
Provided By: Palo Alto   Send Email to POC   View Content   Apr 2021
DOD is moving to an enterprise IT as a service model, allowing it to address manpower challenges while extending its network out to warfighters at the tactical edge. Companies working with the government need to be adaptable and resilient and use tools such as AI, machine learning.

Channeling the Urgency of the Battlefield to Command & Control Testing
Provided By: Keysight Technologies   Send Email to POC   View Content   Apr 2021
The DoD's Software Acquisition Pathway makes it clear: test automation is central to command and control. Read our eBook to discover how the U.S. Army automates testing of thousands of conditions ensuring safer, more reliable software for joint warfighters.

Testing in Regulated Environments
Provided By: Keysight Technologies   Send Email to POC   View Content   Apr 2021
Regulated environments require the best in non-invasive software testing. Read our eBook to discover how you can release software faster, more reliably, and securely.

Raytheon Case Study
Provided By: SDL   Send Email to POC   View Content   Apr 2021
Raytheon's long-term relationship reaps rewards For over 30 years Raytheon has counted on XPP, the highly scalable, high-quality publishing tool, to deliver critical updates for the Patriot missile system to military customers around the world. Read our case study to see how our technology has helped Raytheon deliver a vast amount of tech doc updates each and every year.

Guide to Evaluating Machine Translation Software
Provided By: SDL   Send Email to POC   View Content   Apr 2021
Content is the infrastructure that connects civilization to commerce, innovation, and for the organizations who know how to harness it, dominance in the digital world. It not only drives the modern digital customer experience, but also is critical to business intelligence
and inter- and intra-enterprise collaboration.

Bridging the Gap: Developing Future-Proof Systems in Today's
Provided By: Akima   Send Email to POC   View Content   Apr 2021
Supply chain security. A global pandemic. Complex acquisition models. These are just a few of the challenges impacting the manufacturing, prototyping, and other advanced systems engineering needs of the federal government. In this interview, Zach Conover, General Manager of Akima subsidiaries Lynxnet, Truestone, and Aperture Federal, sits down with the Editor & Chief of Signal Magazine to discuss these issues, as well explore how the Akima portfolio of companies is ensuring it can rapidly deliver best fit solutions in support of today's warfighter in our "new normal." ...

The State of MITRE ATT&CK-Threat-Informed Defense in 2021
Provided By: MITRE Engenuity   Send Email to POC   View Content   Apr 2021
What is the industry's state of knowledge of MITRE ATT&CK vs. the ability to apply it at work? How are organizations utilizing ATT&CK? What ATT&CK-based technologies is the community using? What percentage of the community has done a thorough mapping of their defenses to ATT&CK? Does the community know how to build an ATT&CK CTI product? Does the community have an interest in learning more about how to apply ATT&CK? Are practitioners gaining the advantage over the adversary with ATT&CK, or mainly playing catch up chasing traditional IOCs?

Intelligence Community Innovation Era
Provided By: Booz Allen   Send Email to POC   View Content   Apr 2021
Longstanding proven approaches used by the Intelligence Community must change as technologies, such as artificial intelligence and machine learning continue to evolve and as 5G expands. That's going to be really uncomfortable say Booz Allen Hamilton's Judi Dotson and Brian Green. In a recent video, the two executives talk about the driving forces of change in the IC, in DOD and across critical infrastructure and how your organization can benefit from this transformation.

Precison Machines That Constantly Improve
Provided By: Markforged   Send Email to POC   View Content   Apr 2021
The U.S. Department of Defense is looking at additive manufacturing technologies to rapidly prototype and build equipment components and increasingly, to potentially make replacement parts in the field. X-Fab is one example of the government's interest and support for additive manufacturing technologies. Learn more in this video interview with David Benhaim, co-founder and chief technology officer for Markforged, which develops and makes additive manufacturing equipment and software.