Resource Library:
AFCEA's trusted Resource Library offers a wide range of white papers, e-books, case studies, executive videos and analytical content. These documents may be relevant to your work and of interest to you as a member of the global cyber, defense, security, intelligence and technology communities. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
For information regarding posting content in the Resource Library, please contact our advertising department by phone (703) 631-6181 or email or your SIGNAL account executive.
Filter the library by ...
Intelligence Drives the Decision Advantage
Provided By: Booz Allen

Nov 2023
America's ability to collect and process massive amounts of information, rapidly integrate new collection with existing data for contextual understanding and quickly produce accurate intelligence judgments is key to providing U.S. policymakers and warfighters with decisive decision advantage. Within intelligence circles, achieving decision advantage requires greatly accelerated tasking, collecting, processing, exploiting and dissemination of operationally useful information that informs timely decisions at all levels of our joint operating forces and government.
The Cybersecurity Of Artificial Intelligence
Provided By: Ortman Consulting

Nov 2023
This topic paper explores the complexity and criticality of the cyber threats, vulnerabilities and respective defenses of Artificial Intelligence (AI). The following sections address the Advanced Persistent Threat (APT) as the principle adversary of concern for AI. Follow-on sections track the evolution of AI from fledgling information technology to cornerstone components of our global society's IT infrastructure, intrinsic vulnerabilities baked into these technologies, and the most appropriate defenses that should be explored and employed in the face of these threats a ...
2023 THREAT HUNTING REPORT
Provided By: CrowdStrike

Nov 2023
79 minutes could bring your entire department to a screaming halt. The problem isn't malware-it's adversaries. To stop these adversaries, security teams must understand how they operate. In the 2023 Threat Hunting Report, CrowdStrike's Counter Adversary Operations team exposes the latest adversary tradecraft and provides knowledge and insights to help stop breaches.
Data Is the Tip of the Spear in CJADC2
Provided By: MarkLogic

Nov 2023
Plenty of attention is being paid to the intricacies in executing CJADC2. The Army (Project Convergence), Navy (Project Overmatch), and Air Force (Advanced Battle Management System (ABMS)) all tackle communications and interoperability challenges within their domains, with the aim of eventually being able to cross-reference each other's devices for near-real time information.
The Top 10 Ways Federal Storage is Changing
Provided By: Hitachi Vantara Federal

Oct 2023
Are you curious about the exciting transformations happening in federal storage? Do you want to stay ahead of the curve and understand how these changes can impact your organization? Look no further! The eBook, The Top 10 Ways Federal Storage is Changing, is your guide to navigating the evolving landscape of storage solutions in the federal sector.
Threat Intelligence Helps Counter Cyber Adversaries
Provided By: CrowdStrike

Oct 2023
Today's cyber environment is a race between threat actors and organizations' information technology security staff trying to keep ahead of the next vulnerability. One valuable tool against online aggression from state and criminal actors is intelligence- getting the right information about threats and knowing when to act.
Top Considerations When Designing an Ergonomic Control Room
Provided By: Winsted

Oct 2023
To truly satisfy today's heightened ergonomic standards, console design has experienced a dramatic shift to deliver solutions that are smaller, with improved functionality and more appeal than ever before. Current console design is done with a more comprehensive, top-down approach to control room planning, examining every element of the console itself, as well as the overall layout of the room.
5 Keys to Securing DOD Communications
Provided By: AWS Wickr

Oct 2023
Messaging is changing the way the whole world communicates, and for the United States Department of Defense (DOD), it is vital. Today's DOD must securely collaborate and communicate with contractors, coalition partners, field operations officers, and others without putting their critical data at risk. Whether their teams are in the field, at the base, or at home, standard communication apps can introduce risk. The 5 Keys to Securing DOD Communications eBook was developed to detail five ways the DOD can secure its messaging, better manage and control communications, and ...
Top 5 Myths and Misconceptions that May Drive U.S. Government Agency Users to Rely on Unsecure Communications Apps
Provided By: AWS Wickr

Oct 2023
Why do some DoD users rely on unsecure consumer communications and collaboration apps? Because they need to communicate and collaborate to do their jobs, and the convenience and ease of using consumer apps seems like the only way to do that. In short: They are often operating under misconceptions that lead them to believe that they don't have any better, easier or more secure options. This article addresses those misconceptions and offers a secure, easy and DoD-approved alternative.
Case Study: Enhancing Cybersecurity in Low-Bandwidth Environments
Provided By: SealingTech

Oct 2023
Seeking a game-changing solution that ensures your network remains secure? In SealingTech's latest case study, learn how an outside organization used an innovative dynamic duo (an all-in-one Security Onion sensor and analytic platform configured on the SN 8000) to make incident investigation and forensic analysis easier and more efficient.
Digital Transformation: A Bit More than Automation and Technology
Provided By: AFCEA

Sep 2023
Digital tools have transformed how we live, work and play. Public and private sector organizations are using high tech tools such as artificial intelligence, machine learning and cloud computing to remain competitive in the digital race for enhanced connectivity and capability. Members of AFCEA International's Cyber Committee chose this fascinating topic to explore and collect insights from successful leaders who represent the public and private sectors. In this white paper, authors reviewed their approaches, challenges, failures, lessons learned and successes on their ...
A Cyber Curriculum for a Digital Workforce
Provided By: AFCEA

Sep 2023
Cyber is increasingly important in today's digital world. The need for skilled cyber professionals who can protect our digital infrastructure and data from cyber threats has never been greater. However, the demand for professionals far outstrips the supply, and there is a growing skills gap in the cybersecurity workforce. In this white paper written by members of AFCEA International's Cyber Committee, readers get a sample cybersecurity curriculum designed to cover a range of topics and provide students with a comprehensive understanding of cybersecurity.
AFCEA TechNet Augusta 2023 Solutions Showcase
Provided By: AFCEA

Sep 2023
The U.S. Army Cyber Center of Excellence sought solutions to address both emerging and existing challenges. Several dozen abstracts were submitted to address the Problem Statements with the top solutions presented in the Innovation Theater at TechNet Augusta 2023.
Coming of Age for OSINT
Provided By: Janes

Aug 2023
For the intelligence community (IC) to remain relevant in the information age, it must continue to embrace technological advancements, particularly those in artificial intelligence (AI) and machine learning (ML), in order to triage, wrangle, filter, and manage the vast and ever-increasing amounts of available data, without which the analyst would be overwhelmed.
2023 CrowdStrike Global Threat Report
Provided By: CrowdStrike

Aug 2023
2022 was a year of explosive, adaptive and damaging threats. Adversaries continue to be relentless in their attacks as they become faster and more sophisticated. CrowdStrike's 2023 Global Threat Report uncovers notable themes, trends and events across the cyber threat landscape.
Six Ways to Simplify Your Hybrid Cloud Journey
Provided By: Hitachi Vantara Federal

Aug 2023
As organizations increasingly seek to harness the benefits of both on-premises infrastructure and cloud services, the hybrid cloud model has emerged as a strategic imperative. Download this paper for a clear and actionable roadmap, outlining six key strategies that streamline the complex process of hybrid cloud integration, addressing challenges related to architecture, security, data management, and operational efficiency. Whether you are an IT leader, cloud architect, or a professional tasked with navigating your organization's cloud strategy, this paper equips you wi ...
Turn Data Into Accelerated Insights and Mission Results With DataOps
Provided By: Hitachi Vantara Federal

Aug 2023
In today's data-driven world, organizations face immense challenges in effectively harnessing the vast amount of data at their disposal to drive actionable insights and achieve mission-critical outcomes. Traditional data management approaches often prove inadequate in handling the velocity, volume, and variety of data generated across diverse sources. To address these complexities, DataOps, an emerging methodology, has gained significant attention as a transformative solution. Read this issue brief to explore specific use cases and to learn how DataOps can enable your o ...
Solve the Six Biggest Data Storage Challenges
Provided By: Hitachi Vantara Federal

Aug 2023
Can your IT infrastructure team keep up with the demands of a distributed workforce and data hungry applications? If you are overwhelmed by maintenance tasks and struggling to deliver IT projects fast enough, because you're continually challenged to be agile and "do more with less," it's time to rethink how you manage data storage. This eBook reviews how you can maximize your data infrastructure advantage to get performance and agility that scales by solving six data storage management challenges.