Resource Library:
AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
For information regarding posting content in the Resource Library, please contact Bodil Lund by phone (703) 631-6181 or email or your SIGNAL account executive.
Filter the library by ...

Provided By: Ntrepid Corp


OSINT mediums are ever-changing, and therefore, collecting this information is both an art and a science. Finding the most effective and secure OSINT technologies have a lasting impact on investigations. Conveying the sentiment coined by William Gibson, the street finds its own uses for things, OSINT technologies must change even faster than the mediums that contain it. Investigators require technology with a predictive development cycle, one that allows them to outrun adversaries to their next playing field. Smart security involves using the right OSINT technology and ...

Provided By: Boscobel Marketing Communications


It is important for government contractors to work with reporters to bring awareness to their company, brand and solutions. Understanding what works best for reporters to develop a story facilitates collaboration and trust. Trade shows present a great opportunity for companies to connect with reporters. Here are 10 best practices to ensure that you create these vital relationships.
.png)
Provided By: Parasoft


Download this whitepaper for details on how to ease the burden of compliance with an integrated solution for automating software verification, validation processes and software quality tasks.

Provided By: Parasoft


Learn why and how continuous testing is a critical component of DevOps, guiding development teams at government agencies to meet business expectations and optimize the value of a release candidate.

Provided By: AFCEA


Cybersecurity professionals, especially on-net defenders, experience striking similarities to stress-inducing factors as do first responders. While discussions at cybersecurity conferences dating to 2018 noted a significant rise in burnout, depression and suicide in the community, no official studies exist to date. This white paper, written by members of AFCEA International's Cyber Committee, seeks to educate readers on contributing factors of the current cultures, the potential role of "gamification" to impact behaviors and recommendations to address the issue.
Provided By: Bluescape


Uplevel to a secure virtual workspace to support Federal workforce reentry. In today's work environment, dispersed teams often struggle to collaborate, brainstorm and communicate efficiently. Download this infographic to learn five ways online whiteboards support hybrid work modernization.

Provided By: Lookout


The Cybersecurity Executive Order has agencies committed to taking a more proactive stance against the rapidly intensifying surge of phishing and ransomware attacks against our nation. The Lookout security experts have put together this eBook to help guide you through your Zero Trust journey. Some of the valuable insights and resources. To help accelerate the adoption of Zero Trust and Threat Intelligence strategies, it's important to first understand how to protect data from endpoint to cloud. Discover how a comprehensive Zero Trust strategy can make security an enabler.
Provided By: AFCEA


Supply Chain Cybersecurity includes a complex of everyday operating issues affected by a network of known and unknown connections, services and components. In this white paper, the AFCEA Homeland Security Committee provides a strategic overview of the supply chain cyber issues from the perspective of vendor operational security.

Provided By: Snowflake


As military technological advances from top adversaries have significantly increased over the years, the United States Department of Defense (DOD) has had to reevaluate its strategy toward military operations and the development of capabilities to enable a truly joint force. Read this white paper to learn how Snowflake's multi-cloud, multi-cluster, shared data architecture provides the scale, performance, elasticity, and concurrency today's military requires for multi-domain operations.

Provided By: Dragos


Get a high-level overview of the 2021 Year in Review findings, showcasing key stories and results specific to the ICS/OT threat landscape and industrial cybersecurity maturity.

Provided By: Keysight Technologies


Sensitive systems present unique challenges for testing teams. Read this guide to learn how to identify and overcome obstacles to embracing test automation. You'll also learn how to use non-invasive automation to unearth hidden problems lurking in your most critical systems.
Provided By: Appgate


Appgate Zero Trust for Kubernetes (K8s) provides dynamic secure access for cloud-native workloads. With K8s as a driving force for DevOps and DevSecOps and cloud-native workloads, it's imperative that security evolves to support these new microservice architectures. Appgate SDP unifies user-to-service and service-to-service access for all traditional and cloud-native workloads into a single policy model that accelerates digital transformation and provides least privileged access. With a comprehensive ZTNA solution, you can use a unified policy model that manages secure ...

Provided By: Deltek


A Government Contractor's Guide to Preparation and Assessment Basics.
Provided By: AFCEA


Last year's evacuation of civilians from Afghanistan was a massive undertaking with multiple challenges and successes. e withdrawal required enormous amounts of data, which also presented some obstacles, but ultimately proved successful and offered lessons learned for future operations, according to U.S. Defense Department officials.

Provided By: Dragos


Dragos's annual ICS/OT Cybersecurity Year in Review provides an overview and analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide. Our goal is to give asset owners and operators proactive, actionable information and defensive recommendations in order to prepare for and combat the world's most significant industrial cybersecurity adversaries.

Provided By: Fivecast


The art of collecting, analyzing and making decisions from open-source data for intel purposes is known as OSINT, or open-source intelligence. As the volume of open-source data available online grows exponentially in line with increased threats to communities, AI and machine learning can hold the keys to uncovering essential insights that progress investigations in a timely manner. In this paper, Fivecast, a leader in delivering OSINT solutions globally, outlines how the latest AI and machine learning technology can be applied to OSINT while avoiding creating biases or ...

Provided By: Appgate


Today's distributed, hybrid and agile IT estates have illuminated the VPNs security and complexity flaws - it's time for a better approach to remote network access. Remote work, remote access and network topologies look drastically different today than just 2 years ago, let alone 25 years ago when the VPN was born. The VPN architecture has remained fundamentally unchanged and was designed for a perimeter-centric model that operated under the premise of - trust, then verify. The inherent security flaws and complexities introduced by VPNs introduce risk and slow down digi ...
Provided By: Appgate


Has your agency shifted from a fixed to a nebulous ecosystem of people, devices and systems? Luckily, we have the network security solution answer that can fully protect your government hybrid enterprise.

Provided By: Aruba


This document provides the details of how Aruba networking solutions support the NIST Zero Trust security framework and the US Department of Defense Comply-to-Connect standard.

Provided By: Deloitte


Information technology and operational technology systems often interoperate with each other but require different cybersecurity approaches.