AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
VDC Research conducted a comparative analysis of the mobility management, data protection and security capabilities of BlackBerry's unified endpoint management (UEM) solution and Microsoft's Intune UEM solution. Each was assessed on the level of assurance and utility they provided, their cost effectiveness/total cost of ownership (TCO), and their impact on user experience. This whitepaper will detail the changing nature of end-user computing deployment environments, discuss the need for modern mobility management and collaboration tools that provide secure access to Saa ...
TABLE OF CONTENTS 1. Threats evolution in the cyber-space 2. Situational awareness to face multi-domain threats 3. Cyber situational awareness: Leonardo solution 4. AI to improve human performance and decision-making processes 5. Who we are
Author: Red Hat
Lockheed Martin's F-22 Raptor is one of the most advanced fighter jets on the planet not to mention one of the fastest. But over the past few years, as other nations began to test-fly and deploy their own fifth-generation fighters, Lockheed Martin realized that its software development practices were holding it back, delivering new capabilities to the Raptor too slowly to maintain its dominance. With Red Hat's agile development practices and automated software production pipeline, Lockheed Martin was able to build and deploy new capabilities for the plane at supersonic ...
Author: Owl Cyber Defense
This document includes an overview of critical infrastructure, the associated cybersecurity challenges including a background on industrial control system (ICS) security, and provides a synthesis of the most recent available guidance to secure critical infrastructure and the various supporting systems within a defense context. It is intended as a best practice primer for the cybersecurity of DoD critical infrastructure, and to provide a basic foundation of accumulated knowledge.
Author: Attivo Networks
Endpoint Detection and Response (EDR) systems have become more popular as the technology has advanced. As a result, organizations have shifted their security focus, and budget, to bolstering internal endpoint defenses and away from defending the perimeter. In this paper, Attivo Networks will delve into how deception technology complements EDR to make an organization's internal defenses more robust, complementing existing technologies and improving overall security.
Author: Thundercat & Veritas
From individuals to huge social media firms, everyone is awash in data. Warehousing it is not a problem-we have the cloud for that. For many organizations, the challenge is to be able to access the information they immediately need from the mountains of data that threaten to overwhelm their operations.
And that touches upon another challenge: how much data must be kept to meet government record-keeping regulations? Tossing data helps remove information that no longer is necessary for daily operations, but that data might be needed for legal reasons. So, widesprea ...
Author: Attivo Networks
The implementation of a comprehensive cybersecurity plan to protect Industrial Automation and Control Systems (IACS), including SCADA, is critical to protecting confidential company information, complying with applicable laws and maintaining safe and reliable operations. A defense-in-depth approach to cybersecurity reduces risk with each effective layer of protection and combines a mix of defense and offense measures for the maximum protection against a breach. The implementation of a Dynamic Deception solution provides the real-time visibility into threats that have by ...
This edition of The Cyber Edge celebrates and recognizes the contributions of women in cybersecurity and STEM. All of the articles in the section were written by women and feature expert opinions on operating in a time where information o en can be a weapon.
Author: Core Security, a HelpSystems Company
Federal agencies are often high targets of attackers to obtain access to your environment, steal data, or leak information. There are seven common ways hackers try to get into federal agencies. In this guide you'll receive descriptions of each type, real-world examples of why hackers want data in that way, and strategies for protecting against common hacker methods.
Author: ViaSat, Inc.
From the end of the Cold War to the present era, there has been a growing need for military platforms to coordinate for operations and to share information. The Link 16 family of data links has been central to providing critical battlefield information to the U.S. and its allies since the 1980s.
Author: Red Hat
Talk about taking on a big job: Red Hat wants to bring agile software production practices and the company's OpenShift application development platform into the Department of Defense with their decades of constraints, habits and bureaucracy
An annual presentation on current technology trends provided by the AFCEA International volunteer Technology Committee. Provides insights and expertise in emerging technology topics most relevant to Federal technology leaders.
As conflicts become faster and more complex with multiple platforms and data streams feeding information to warfighters, there is a growing need to manage this process to improve operational efficiency. The Department of Defense (DOD) is investing in cloud and machine learning tools and systems to help improve situational awareness and connectivity at the last tactical mile
When the NATO Communications and Information Agency (NCIA) went looking for technology to enable alliance officials to use smartphones without being eavesdropped on by hackers or spies, they immediately came up against a problem.
How DevSecOps Helped Address Data Integration Challenges in Healthcare
A January 2018 commissioned study conducted by Forrester Consulting on behalf of ServiceNow How a Representative Organization Resolved Security Incidents 45% Faster This Forrester Study provides a framework and customer example to help readers evaluate the potential financial benefits of investing in ServiceNow Security Operations. To understand and illustrate the benefits, costs, and risks associated with ServiceNow, Forrester interviewed three current Security Operations customers to create a representative organization. This organization: Improved vulnerability respo ...
This white paper looks at how hypersonic flight will place radical new demands on the embedded computing systems on which they will rely - in terms of not only new levels of performance, but also of new levels of ruggedness
Author: General Dynamics Mission Systems
TACLANE RUZ feature supports integration in unmanned and manned platforms, forward deployed and sensor applications. Interested in learning more? Request the RUZ whitepaper now!
Author: Kemp Technologies
"Hybrid Cloud" is used to describe an application hosting approach that spans the range of private datacenter, hosted datacenter, virtual computing, cloud computing, and the many variations between and among these approaches. Selecting the best approach for application hosting enables federal customers to quickly take advantage of the opportunities within each approach.
Today's communications landscape has migrated to mostly wireless communications. This doesn't mean that communications are more secure. In fact, it means that the attack surface has become much larger. Wireless traffic has the potential to be captured, listened to and even hijacked without any indication to those on either end of a call. The good news is that these communications can be protected with solutions that encrypt and secure voice and messaging communications so that even if its captured, it will reveal no usable information.