AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
Provided By: Unisys Jun 2021
The pandemic prompted a rush to the cloud. Fast action was critical given the rapidly expanded work-from-home requirements and the need for touchless procurement, sales and service. Now the initial rush has passed, and the dust is settling down. It's time to assess and address the compliance, cybersecurity, data privacy and risk implications of your cloud deployment. Cloud security and compliance continue to be the biggest pain points for cloud customers. If you think it's too late for that, think again. It's never too late to do things right. Doing things right is mor ...
Provided By: Unisys Jun 2021
The cloud journey is exciting. Done right, it can bring many benefits to your company. If you don't do it right, however, the cloud can create significant nightmares. So, put the appropriate focus on cloud security, and not just on the cloud journey. Know that breaches will occur. And be ready to remediate and isolate breaches within seconds or minutes to limit the attack surface.
Provided By: Security Engineered Machinery Jun 2021
SEM's Information Destruction 101 breaks down the NSA standards for data destruction by classification, material, use case, and volume. Includes best practices for data destruction as well as discussion on the challenges surrounding enterprise drive destruction, the recent DVD/BD requirement, and implementation of the ISOO CUI mandate. Also includes information on zero landfill solutions for centralized paper destruction that comply with agency greening standards and contribute toward LEED certification.
Provided By: AFCEA Jun 2021
Summer 2021 Technology Vectors Update by the AFCEA Technology Committee An annual presentation on current technology trends provided by the AFCEA International Technology Committee. Provides insights and expertise in emerging technology topics most relevant to federal technology leaders.
Provided By: Netskope May 2021
As the Department of Defense migrates more mission-critical systems and software to cloud environments, it must also consider an innovative way for securing this new environment from potential cyber attack.
Provided By: SpiderOak May 2021
President Bidens new cybersecurity requirements have been a ng time coming, and fit with trends we have observed and incorporated at SpiderOak. For example, the executive order will bring the government and its vendors closer to what is called zero trust, which refers both to the way computer systems are designed and how they are used. Previously, government agencies focused on malicious threats originating outside of their organizations, but were less rigorous in controlling and compartmentalizing data inside their perimeters. Hackers have exploited the vulnerability ...
Provided By: Dell May 2021
One of the biggest attractions of 5G is the promise of high-speed wireless data rates, but that's just part of the picture, according to Chris Thomas, an IT communications strategist and systems architect at Dell Technologies. 5G's high speeds are part of set of transformative technologies that include virtualization and the proliferation of models like DEVOPS and DEVSEC Ops and the ability to leverage all of these in a multi-cloud environment.
Provided By: Intel May 2021
Veterans are an important part of the technology industry because they are trained in problem solving, they understand adversity and they know they how to get a job done. Intel Corporation recognizes that military backgrounds align well with company values, and as a result, hires veterans to help drive its technological breakthroughs. Several veterans talk about their Intel work experience in this executive video.
Provided By: Elastic May 2021
The Defense Department (DoD) is continuing to build out a truly data-centric approach based on the DoD Data Strategy, presenting new opportunities for transforming the way data is collected, analyzed and leveraged.
Provided By: Resecurity May 2021
Recent cyberattacks against critical infrastructure, such as the May 2020 attack on the Colonial Pipeline Company, have put a spotlight on cybersecurity vulnerabilities. Identifying and combating cyber adversaries require both human intelligence and a deep technical expertise, according to Gene Yoo, CEO of Resecurity Inc. To combat such threats, companies and government agencies need accurate intelligence, and that intelligence is as important as is information sharing between organizations. Learn more in this executive video.
Provided By: Okta May 2021
Zero trust lets organizations build security into their network architecture from the beginning. Security can be be just as agile and part of the conversation and really just as modernized as other aspects of network modernization explains Sean Frazier, federal chief security officer at Okta Inc. in a recent interview.
Provided By: Microsoft May 2021
As the U.S. Department of Defense (DoD) drives forward on its cloud strategy, development teams and chief information officers alike are looking for faster ways to deploy new capabilities, proactively address cybersecurity challenges and take advantage of the resiliency of cloud operations.
Provided By: Quest/DLT May 2021
When a new administration takes office, its high-profile tech agenda often focuses on government's role as regulator, legislator, and appropriator, but it also brings a plan for agencies that use technology to deliver on their missions.
Provided By: SDL May 2021
When a combined Republic of Korea-U.S. army division works with both U.S. and South Korean units, it's vital to overcome the obvious language barrier. The division wanted a solution for all 10,000 of its personnel that would outperform word-by-word dictionary translation. Read the case study to learn how the right machine translation solution transformed real-time communication in just a few days.
Provided By: Dell May 2021
PowerScale provides simplicity at scale, intelligent insights, and multi-protocol support from edge to core to any cloud.
Provided By: AFCEA May 2021
Winning in cyberspace is at root a human problem. We urgently need to build the next generation of digital leaders to prepare both government and civil society to defend and deter in this venue. It is time for us to consider developing a national cyber or digital service academy, much like the dedicated national service academies at Annapolis, West Point, and Colorado Springs. In this white paper the AFCEA Cyber Committee details a way forward for this initiative.
Provided By: ViaSat, Inc. May 2021
It is no secret that the world is experiencing unprecedented, exponential growth in technology and that militaries have an increasing need to modernize their weaponry, intel systems, and communications equipment for warfighters in the field. However, as the battlespace continues to be modernized, the threats continue to advance, and the integrity of communications and applications becomes a top priority. Learn the importance and keys to securing tactical UAVs.
Provided By: Thycotic May 2021
Organizations often have exponentially more privileged accounts than they have employees. As the number and diversity of privileged accounts increase, the attack surface expands, and there is simply no way to protect these sensitive accounts using only manual interventions. Trying to secure privileged accounts manually is resource-intensive, costly, and prone to human error. Facing a shortage of security skills, many organizations are understaffed, leading to increased workload, stress, and mistakes. Automation helps you accelerate and streamline activities to secure pr ...
Provided By: Thycotic Apr 2021
Determining a security access management strategy is essential, but doing so is often delayed by over analysis and caution. Ross Johnson, director of federal sales for Thycotic Software Ltd, in a recent interview explains several ways to approach the problem efficiently, including taking inventory of data assets, examining audit processes and looking at lifecycle aspects.
Provided By: AFCEA Apr 2021
The national security community needs to prepare
now for the possibility that U.S. adversaries could
be first to develop and deploy quantum computers, which would render useless most conventional
encryption algorithms, says Adrian Stanger, senior cryptographic authority, Cybersecurity Directorate, National
Security Agency (NSA).