Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Securing the Enterprise when employees work remotely
Author: Attivo Networks   Send Email to POC   View Content
For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportunity for cybercriminals and reduces their time to compromise. While it is impossible to prevent every possible attack, proper planning and use of deception technologies could detect and prevent lateral movement and avert a more significant impact on the organization. To learn more, check out this solution brief on securing the enterprise while employees work remotely.

Fundamentals of Mobile Device Security
Author: Bittium   Send Email to POC   View Content
What are the most relevant aspects that must be taken into account in mobile device security? In this White Paper we will dive into fundamentals of mobile device security from main perspectives, and answer to questions such as: What are we fighting against? What are we protecting? We tell about the techniques that mitigate the threats and reveal the main points organization has to address to protect own and customers' data.

Taking the Risk out of Software Supply Chain Management
Author: Flexera   Send Email to POC   View Content
Supply chain management is vitally important to running and maintaining an organization's IT systems. When it is carried out, in many federal agencies it's traditionally a manual process managed on spreadsheets. In recent years new directives have mandated that the Department of Defense (DOD) and civilian agencies must all begin monitoring this, especially for cybersecurity considerations within the Department's Risk Management Framework (RMF). In this editorial, Flexera Software explains how many department directors are paying more attention to life-cycle management f ...

NIST: 800-160 (2) AND 800-171 (B) SECURING HIGH VALUE ASSETS AND CONFIDENTIAL UNCLASSIFIED INFORMATION
Author: Attivo Networks   Send Email to POC   View Content
The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respectively. These documents give an organization clear guidance on implementing secure systems from the policy, process, personnel, and technical perspectives. This paper will very briefly summarize these NIST publications, introduce deception technology, and show how deception technology fits within the NIST guidelines to support regulatory compliance and enhanced security.

Daedalus Enterprise Search Appliance
Author: PSSC Labs   Send Email to POC   View Content
Department of Defense agencies are using Elasticsearch for a variety of workloads, ranging from cybersecurity to logistics. These organizations require a secure, simple to deploy enterprise platform to meet their ever-increasing workloads. PSSC Labs Daedalus Enterprise Search Appliance offers a truly turn-key, high performance platform certified compatible with Elastic Cloud Enterprise (ECE) with the absolute lowest total cost of ownership. The platform includes all necessary hardware, software, networking and ECE license upon delivery.

Please complete the reque ...

The U.S. Cybersecurity Industrial Base and National Security
Author: AFCEA   Send Email to POC   View Content
This white paper conveys to U.S. national security policy makers and decision makers observations and recommendations regarding the nation's cybersecurity industrial base and this sector's ability to support and strengthen the national security of the United States.

Monitoring Interference in the 2.4 GHz ISM Band with a Real-Time Spectrum Analyzer
Author: Anritsu, Inc.   Send Email to POC   View Content
This paper highlights the power of an RTSA spectrum analyzer for detailed analysis of crowded areas of spectrum. The Field Master Pro MS2090A RTSA has a probability of intercept (POI) of 2.055 μs, meaning it is certain to capture the shortest of packets seen in the ISM bands. The spectrogram feature provides a view over time of spectral activity and a user settable persistence mode enables identification signal in signal interferers.

Practical Uses for a Real-Time Spectrum Analyzer in 5G, LTE, and Wi-Fi Spectrum Monitoring
Author: Anritsu, Inc.   Send Email to POC   View Content
Limitations in conventional spectrum analyzers are found in two key areas: signal power density and visualization of fast digital signals. This is where the strength of a real-time spectrum analyzer (RTSA) becomes apparent.

For fast changing signals, complex modulations, and the highly variable RF transmissions of the future, the new standard in spectrum measurement is the real-time spectrum analyzer. The Anritsu Field Master ProTM MS2090A solution is the highest performance portable RTSA available.

Understanding Key Real-Time Spectrum Analyzer Specifications
Author: Anritsu, Inc.   Send Email to POC   View Content
Advances in technology and design have enabled the creation of the first high performance real-time handheld spectrum analyzer with a 110 MHz analysis bandwidth and a 100% probability of intercept duration of 2.06 μs. Together with the variable persistence density display and spectrogram, the Anritsu Field Master Pro MS2090A spectrum analyzer is well suited to meet challenges in analyzing dynamic RF signal events and detecting transient interferers, and unwanted hidden signals.

The Growing Need to Protect Classified Data at Rest (DaR)
Author: General Dynamics Mission Systems   Send Email to POC   View Content
Is your sensitive data secure? Do you comply with the latest federal data at rest policies? Learn how high assurance encryption solutions will safeguard your critical information.

The Cyber Edge January 2020
Author: AFCEA   Send Email to POC   View Content
FBI Strives to Keep Ahead of Cyber Adversaries.
A rapidly changing threat environment compels increased cooperation.

5G Wireless Opens New Possibilities for Government
Author: Nokia   Send Email to POC   View Content
5G wireless technology is poised to take the world by storm, offering fast and effective network connectivity at data throughput speeds once reserved for dedicated fiberoptic landlines. This increased speed will also fuel new developments in wireless applications and connected devices to vastly increase the size, depth and interconnectivity of networks of all kinds. In this article, Nokia and Nokia Bell Labs explores the topic of 5G further.

By submitting this form, you agree to receive marketing communications from Nokia. Nokia handles your data in accordance t ...

Best Practices in Drafting a Data Decommissioning Policy
Author: Security Engineered Machinery   Send Email to POC   View Content
As obsolete technology and routine maintenance continue to replace old information and storage devices, it has become more critical than ever to destroy data properly with a data decommissioning policy. Through proper research and a unified vision, a policy can be written that can keep information secure, prevent data leaks, and even save money in the long run.

Will Your Security Solution Fit the New CMMC Framework?
Author: Attila Security   Send Email to POC   View Content
The Cybersecurity Maturity Model Certification (CMMC) promises to have significant impact on the state of cybersecurity requirements for US DIB contractors. Each member of the DIB supply chain plays a vital role in the nation's security, and contractors that are not CMMC certified will not be eligible to bid on government defense contracts. Download this whitepaper to get CMMC preparation tips and to learn if your current security solution will fit the new CMMC framework.

NIST: 800-160(2) and 800-171(B) Securing High Value Assets and Confidential Unclassified Information
Author: Attivo Networks   Send Email to POC   View Content
The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respectively. These documents give an organization clear guidance on implementing secure systems from the policy, process, personnel, and technical perspectives. This paper will very briefly summarize these NIST publications, introduce deception technology, and show how deception technology fits within the NIST guidelines to support regulatory compliance and enhanced security.

The Cyber Edge October 2019
Author: AFCEA   Send Email to POC   View Content
Cyber policy traditionally has focused more on enterprise networks than tactical systems, according to Nancy Kreidler, the Army's new leader for the Cybersecurity and Information Assurance Directorate within the Office of the Chief Information Officer/G-6. But new initiatives emphasize cybersecurity in the tactical environment, including networks, weaponry and any other systems used by warfighters.

Cyber Insurance
Author: Cyber Insurance   Send Email to POC   View Content
The Cyber Insurance Subcommittee of AFCEA International's Cyber Committee concluded cyber insurance is useful in risk transference but with some important caveats. For example, a purchase decision is contingent on individual company circumstances, such as revenue, risk tolerance, board guidance and regulatory environment relative to protected categories of information. In addition, every purchase decision should be critically reviewed regarding the extent of exclusions to coverage in each policy. The subcommittee also concluded that it remains in the indeterminate futur ...

Selecting the Optimal DSP Solution for EW Applications
Author: Abaco   Send Email to POC   View Content
In a rapidly changing technology environment, developers of advanced electronic warfare solutions face a sometimes bewildering array of choices. It's not just about RF performance, though. Here, we describe some of the options and trade-offs.

The Truth About Federal Data Center Modernization
Author: Vertiv   Send Email to POC   View Content
From the Federal Data Center Consolidation Initiative nearly a decade ago to last year's IT Modernization Fund, the government continues to prioritize data center modernization. Despite directives from two administrations, agencies are often reluctant to transition away from outdated legacy systems. Progress remains slow and pocketed. This begs the question: why? Download this report to debunk the four perceived obstacles to modernization in the Federal government and to discover how to better make the case for modernization within your organization.

The Three Tenets of IT Modernization
Author: Pegasystems   Send Email to POC   View Content
Government organizations are complex. They have deeply rooted and unique cultures, data siloes, and significant legacy systems associated with them. To avoid the mistakes that have doomed past modernization efforts, agencies must consider employing best practices that are more agile and iterative in nature, cloud-based, and model driven. Download this white paper to find practical guidance on approaching legacy modernization.