Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...


Public-Private Partnerships Key To Combatting Cyberthreats
Provided By: SolarWinds   Send Email to POC   View Content   Sep 2021
Adopting a security by design approach is helping SolarWinds improve its security while also promoting supply chain security with its customers.

The Cyber Edge October 2021
Provided By: AFCEA   Send Email to POC   View Content   Sep 2021
Coast Guard Embarks on Cyber Offense. The service blends its traditional maritime roles with expanded digital strengths to thwart adversaries.

Maximizing Efficiency with Virtual Workspaces
Provided By: Bluescape   Send Email to POC   View Content   Sep 2021
The speed and distributed nature of the modern public and private workplace means that getting the right teams and people aligned for a project can be challenging, as can coordinating and sharing information between those individuals. One way to do this is through virtual workspaces that can be applied to both existing physical spaces like meeting rooms and in a purely online setting.

Closing capability gaps to improve warfighters' real time situational awareness
Provided By: Elastic   Send Email to POC   View Content   Aug 2021
For warfighters, an important part of achieving real time situational awareness is getting the most pertinent and relevant information to commanders and other decision makers. Finding a way to do that is not only about business decisions, it's also about the way we make software and the way we roll out programs. Learn more about meeting the situational awareness goal from David Erickson, senior director for solutions architecture at Elastic.

Air Force IT modernization aims to streamline, speed up operations
Provided By: Akima   Send Email to POC   View Content   Aug 2021
The U.S. Air Force IT enterprise deals with a range of needs, from managing services such as help desk tickets to managing major initiatives such as cybersecurity and cloud migration programs. Governance, configuration management and a customer focus are the key components to its success. Learn more from Douglas Dudley, director of Air Force programs for Akima LLC.

Building Mission - Driven 5G Security with Zero Trust
Provided By: Booz Allen   Send Email to POC   View Content   Aug 2021
Now more than ever, national security missions must overcome risks around untrusted technology in a hyperconnected world. To enable resilient operations and shield sensitive data through these challenges, the Department of Defense is urging its senior leaders, engineers, operators, and contractors to embrace a "zero trust" security model for sensitive data, systems, and services, including fifth-generation (5G) mobile technology. All networks should leverage this mindset. And putting zero trust into action today with existing tools can mitigate emerging mission risks an ...

AFCEA TechNet Augusta Solutions Abstract
Provided By: AFCEA   Send Email to POC   View Content   Aug 2021
With assistance from the U.S. Army Cyber Center of Excellence and industry experts, TechNet Augusta 2021 is designed to open the lines of communication and facilitate networking, education and problem solving. This Solutions Review Compendium complements the event and helps builds engagement in advance.

Achieving Digital Transformation Within the Army
Provided By: BMC   Send Email to POC   View Content   Aug 2021
Learn how BMC's Gartner-leading SaaS ITSM solution, coupled with the immense power of AWS, can solve your enterprise service desk challenges. This e-Book explores why BMC is able to provide the highest-rated solution at the lowest cost, providing the opportunity for the fastest time to mission value, all while minimizing risk.

Cybersecurity Risk vs. Compliance: What is the Difference and Why It Matters
Provided By: SteelCloud   Send Email to POC   View Content   Aug 2021
Cybersecurity for computer networks and systems just keeps getting tougher every day. New attack vectors and threats occur by the hundreds on a daily basis. Protecting systems and data requires massive defensive vigilance and action on the part of CISOs, CTOs, CIOs and the personnel that work for them at multiple points in the value chain of serving up information systems services to a needy customer base. Cyber incursions are happening at scale, bad actors are behind them, and we have to eliminate or mitigate the risk. In government, compliance usually deals with a law ...

Modeling Realistic Military Networks in Controlled, Secure Environments
Provided By: iTrinegy   Send Email to POC   View Content   Aug 2021
The world is working towards "digitization of the battlefield", and for this to be achieved, a test environment needs to be able to realistically model desired, disadvantaged and disrupted networks. This guide looks at how to set up your own high-fidelity Software Defined Test Networks in a fully controllable lab environment and how they can save money and time by reducing the number of expensive live field trials needed to confirm application, systems and device resilience. Read More.

Leveraging Software Emulation to Root Out Hackers
Provided By: ViaSat, Inc.   Send Email to POC   View Content   Jul 2021
Big data and automation tools help organizations fingerprint malicious online behavior.

The Importance of Bringing Video and Audio Distribution to your Network Weapons System
Provided By: Crestron   Send Email to POC   View Content   Jul 2021
Treating your network as a weapons system will allow secure transmission of video, audio, and USB data, and help protect sensitive data.

Why Small Businesses Need Easy, Simple, Effective, and Accessible DNS Protection.
Provided By: Mission Cyber   Send Email to POC   View Content   Jul 2021
Small businesses are beginning to feel the pressure of CMMC compliance. After numerous webinars and roundtable discussions on strategy and what-ifs, it's time to discuss tactics and how we get this done. Can the SMB DIB community help itself obtain compliance and strengthen cyber hygiene for its contractual government data, as well as protecting our own? Mission: Cyber believes it starts with a single CMMC control leveraging protective DNS.

The Zero Trust Approach To Information Security For The Mobile Workforce
Provided By: Yubico   Send Email to POC   View Content   Jul 2021
Modern Authentication Can Secure DoD Information for Excellence in Mission Execution.

Assured Cross-Domain Access Through Hardware-Based Security
Provided By: Garrison   Send Email to POC   View Content   Jul 2021
Connectivity is at the heart of today's modern military operations. To conduct complex, distributed multidomain operations at speed and scale, U.S. and allied forces need seamless connectivity to enable real-time communications and high-fidelity data flows

Meeting DoD's Data Challenges with a Federated Data Strategy
Provided By: Microsoft Azure   Send Email to POC   View Content   Jul 2021
To maintain America's advantage over potential adversaries, the Department of Defense last year outlined a data strategy directing that military leaders must recognize that data is a strategic asset that must be operationalized in order to provide a lethal and effective Joint Force that, combined with our network of allies and partners, sustains American influence and advances shared security and prosperity.

Achieving Decision Dominance by Empowering the Tactical Edge
Provided By: Red Hat   Send Email to POC   View Content   Jul 2021
Decision dominance is the ability for a commander to sense, understand, decide, act and assess faster and more effectively than any adversary, Army Futures Command Commander Gen. John Mike Murray, USA, told the Association of the U.S. Army Global Force Next virtual conference in March.

Achieving the Army's Data Imperatives at the Tactical Edge
Provided By: Elastic   Send Email to POC   View Content   Jul 2021
By design, the DoD Data Strategy compels transformational change in the way data is collected, analyzed and leveraged. The mechanics may be different depending on domain or joint all-domain mission, but as referenced in a previous SIGNAL special interest editorial, the strategy's endgame is to ensure that trusted information gets to the right destination at the right time.

Why It's Time To Replace Your VPN
Provided By: Appgate   Send Email to POC   View Content   Jul 2021
Today's distributed, hybrid and agile IT estates have illuminated the VPNs security and complexity flaws - it's time for a better approach to remote network access. Remote work, remote access and network topologies look drastically different today than just 2 years ago, let alone 25 years ago when the VPN was born. The VPN architecture has remained fundamentally unchanged and was designed for a perimeter-centric model that operated under the premise of - trust, then verify. The inherent security flaws and complexities introduced by VPNs introduce risk and slow down digi ...

An Assume-Breach Mindset: 4 Steps To Protect What Attackers Are Really After
Provided By: Merlin Cyber   Send Email to POC   View Content   Jul 2021
It's time to adopt an "assume-breach" mindset to detect and isolate adversaries before they traverse your network and inflict serious damage. An assume-breach mindset means thinking like an attacker. If, like us, you spend a lot of time helping organizations prevent and respond to attacks and breaches, you get to know a lot about how attackers think. So in this guide, we're using what we've learned to help you protect your organization against the most common attack paths attempting to compromise your most critical assets.