AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
Provided By: archTIS Nov 2021
Building Dynamic Information Barriers in Microsoft 365 and Teams This white paper examines the challenge of building information barriers in Microsoft 365 applications including SharePoint and Teams using role based security and how to create more usable separation for more complex defense and multinational use cases using dynamic attribute-based access control (ABAC) policies.
Provided By: Mark Logic Nov 2021
New types of architectures like Smart Data Fabrics help agencies make better use of the data they gather by breaking down silos and using smart tools to structure the information.
Provided By: Spirent Nov 2021
High-performance use cases such as Work From Home, industrial IoT, telehealth and 4K streaming video are driving adoption of a new generation of Wi-Fi connectivity. These use cases come with high expectations even as the complexity of Wi-Fi networks and the interoperability challenges surge. How can service providers and vendors ensure Wi-Fi 6/6E and beyond deliver the performance their customers demand? They must thoroughly test new Wi-Fi products and services in controlled, repeatable conditions that mimic the real-world. Created by Spirent's team of Wi-Fi experts, th ...
Provided By: Redcom Nov 2021
The Zero Trust Architecture (ZTA) has rapidly become the hottest topic in cybersecurity. However, REDCOM has noticed that today's discussions inevitably focus on ZTA from the standpoint of the enterprise, ignoring the nuances and pitfalls of implementing ZTA in the tactical domain. Instead of driving the ZTA solely from the top-down, REDCOM is seeing an operational benefit in constructing the enterprise ZTA from the bottom-up. This paper will delve into the potential issues with the industry's current approach and introduce our solution, REDCOM ZKX. ZKX changes the secu ...
Provided By: Spirent Nov 2021
5G wireless technology offers the potential for virtual and augmented reality supported capabilities for warfighters and even more capable robotic and remote operated platforms, but technical and security challenges must me met before it can enter widespread service.
Provided By: Tanium Nov 2021
On May 12, 2021, President Biden signed an Executive Order (EO) to improve the nation's cybersecurity and protect federal government networks. True improvement necessitates the adoption of modern approaches and practices, with the most critical element being enterprise wide, real-time visibility and control. As proven by numerous recent cyber events, federal agencies cannot rely on prevention and detection capabilities as the only solution. The approach, capabilities, and requirements must provide everyone from the CISO to the System Administrator with the ability to id ...
Provided By: Pexip Oct 2021
Zero Trust is shaping the future of data security for government organizations. In this white paper, you'll learn what Zero Trust is, how it works, and why data-centric security matters. You'll also discover the role of data confidence, and why dynamic risk assessments will revolutionize everything we think we know about cybersecurity.
Provided By: Netscout Oct 2021
Applications that require a high level of security and guaranteed packet delivery are best served by a Layer 1 Matrix Switch. Many types of applications, from video distribution systems for command and control to large-scale cyber test ranges, require secure, high-performance packet delivery that a traditional networking infrastructure cannot provide. Learn more about three use cases for NETSCOUT's Matrix Switches and management software.
Provided By: Ntrepid Corp Oct 2021
Managed attribution (MA) is the process of controlling the technical and behavioral indicators that comprise your online identity (or attribution). By managing their attribution, operators, investigators, analysts, and researchers can construct an online identity that is consistent with their mission and may persist over time, allowing them to access social media platforms, dark web markets, and other online operational domains. This MA-enabled access allows users to pursue a variety of online missions without revealing their identity or organization. In short, effectiv ...
Provided By: Technical Systems Integrators Oct 2021
For companies that have or make use of production network infrastructures whether private or public, in the cloud or a hybrid, there is a need for developers, consumers of the infrastructure, and the administrators of the infrastructure to perform cyber training, testing, and exercises on a replica of their production infrastructure or Cyber Range. Delivering this Cyber Range as a Service (CRaaS) allows for the fastest and most economical way to for users to perform their required tasks. The myriad of services, applications, processes, methodologies, and tools such as t ...
Provided By: Deloitte Oct 2021
Multi-domain operations present the DOD with several challenges, such as dealing with biased data, using that information more effectively and cutting the data collection to decision loop.
Provided By: Appgate Oct 2021
Has your agency shifted from a fixed to a nebulous ecosystem of people, devices and systems? Luckily, we have the network security solution answer that can fully protect your government hybrid enterprise.
Provided By: AFCEA Sep 2021
The U.S. Navy is moving ahead at full speed to equip its assets with e¬ective cybersecurity. However, the diverse nature of those assets, some are city-size ships while others are small but vital systems, confound planners seeking to ensure interoperable security measure.
Provided By: Qumulo Sep 2021
Defend your Mission-Critical Data Every agency needs a robust business continuity strategy. A plan that is practical, cost-effective, and ready to protect against ransomware threats. Implementing secure and modern IT solutions to help minimize the attack surface to defend against compromises before they happen is an important component of the plan. Here are 5 best practices government agencies should keep in mind when developing a data protection plan and ensure the safety of valuable data.
Provided By: Zapata Sep 2021
Decision Support Systems (DSS) are valuable, and the military knows it. The integration of augmented intelligence (AI) which uses human-machine teaming, combines artificial intelligence and machine learning (ML) to make DSS even more valuable by enabling better, faster, and more informed decisions up and down the chain of command. This paper examines the merits of the various types of DSS, including the human-centered systems that currently prevail in command decisions. It also outlines the specific features and benefits of CASCADE, Zapata Technology's proprietary decis ...
Provided By: Spirent Sep 2021
More than any previous generation of cellular technology, 5G has entered the popular consciousness. Even a global pandemic hasn't been able to slow down its momentum. With all the noise surrounding 5G, Spirent's experts have put together a guide that revolves around best practices to safely accelerate 5G.
Provided By: Recorded Future Sep 2021
Patching vulnerabilities is critical for protecting an organization's data and assets. 60% of breaches have been linked to a vulnerability where a patch was available but not applied. However, identifying which vulnerabilities are a priority is difficult, and relying on CVSS scores alone won't do the job. Of the 18,000 vulnerabilities identified in 2020, nearly 60% fell into the categories of "high" or "critical". To truly protect against vulnerabilities, organizations should employ risk-based vulnerability intelligence to understand which threats pose the largest risk ...
Provided By: AFCEA Sep 2021
Coast Guard Embarks on Cyber Offense. The service blends its traditional maritime roles with expanded digital strengths to thwart adversaries.
Provided By: SolarWinds Sep 2021
Adopting a security by design approach is helping SolarWinds improve its security while also promoting supply chain security with its customers.
Provided By: Bluescape Sep 2021
The speed and distributed nature of the modern public and private workplace means that getting the right teams and people aligned for a project can be challenging, as can coordinating and sharing information between those individuals. One way to do this is through virtual workspaces that can be applied to both existing physical spaces like meeting rooms and in a purely online setting.