AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile endpoints. And while almost every CIO knows how important mobile security is, getting a grip on it can be tough. There's a lot to consider, and new factors enter the equation all the time. On the pages that follow, you'll find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers. If you answer no to many of these questions, you may have some significant gaps in your approach to mobile secu ...
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...
Micro-segmentation is fast becoming a foundational layer of the security
architecture for today's data center and cloud computing environments.
It has seen a big push by a range of vendors as well as growing
recommendations from leading analyst firms such as Gartner, ESG, and
the 451 Group. This paper outlines the reasons why organizations of all sizes are considering this technology in their data center and cloud security plans.
As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks.
In February 2017, Tavis Ormandy of the Google Project Zero team exposed major memory leakage in Cloudflare's Content Delivery Network (CDN) web caching services. It exposed all sorts of sensitive data, including passwords, authentication tokens and cookies. Although this is just one example of a cloud-oriented service with a major security issue (which, for the record, the company responded to immediately and remediated quickly), it demonstrates that all of us may have ...
The world of IT and the datacenter remains in the midst of a massive structural shift built on a foundation of mobile, social, big data, and cloud services. At the highest level, the two types of deployment models for cloud services are public and private:
▪ Public cloud services are shared among unrelated enterprises and consumers, open to a largely unrestricted universe of potential users, and designed for a market, not a single enterprise.
▪ Private cloud services are shared within a single enterprise or an extended enterprise, with restrictions on access and l ...
Digital innovation harnesses emerging technologies that include modern development languages, DevOps collaboration, containers, open source, big data, online social engagement, and dynamic
software-defined multicloud infrastructure platforms. Although large organizations invest aggressively in developing new applications, they continue to rely on established databases, middleware, and
applications built for more reliable, tightly coupled architectures. Together, modern and traditional applications, databases, and infrastructure technologies must be well integrated ...
The datacenter infrastructure market is undergoing a dramatic change. IT executives are increasingly turning to next-generation datacenter technologies that support extensive digital transformation projects while improving operational efficiencies. This is driving new infrastructure spending on solutions that are able to drive down costs, reduce complexity, and increase agility of IT staff. Sales of hyperconverged infrastructure (HCI) have increased dramatically over the past few years because of, in part, the ability of these solutions to collapse core compute, storag ...
Your approach to vulnerability management may be putting your organization at greater risk. Just dealing with vulnerabilities that a vendor said were "critical" isn't enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low-hanging
fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn't be tagged as a high priority in a purely vulnerability-centric ...
The United States Air Force Integrated Logistics Systems-Supply (ILS-S) is the definition of a mission critical system. It is used by over 18,000 users at 260 U.S. Air Force, Air Force Reserve, and Air National Guard fixed operating bases and forward operating locations, to provide daily supply and equipment support for wartime flying missions. The Air Force needed a low-risk solution to modernize the 50-year old Standard Base Supply System (SBSS, a key portion of the ILS-S system) to drive down operating costs, while retaining all of its functionality.
The ILS-S ...
Developed by ViaSat and Harris, the Small Tactical Terminal (STT) KOR-24A is a two-channel radio designed to meet the needs of users who have SWaP-C constraints, but also need simultaneous access to Link 16 and either wideband waveforms or legacy communications pathways, including Very High Frequency and Ultra-High Frequency (VHF/UHF). With the STT, it is now possible to consume tactical information from a ground network and pass that information over to Link 16 and vice versa, creating seamless SA and a Common Operational Picture (COP) between air and ground forces. It ...
Author: Red Hat
IDC interviewed organizations using Red Hat® technologies and representing a variety of vertical industries. IDC asked these organizations how Red Hat Training courses improved IT operations and the ability to support business requirements and new technologies.
IDC survey results confirm that Red Hat training courses offer key benefits to companies:
- Adding just 1.5% of project budget to include training can move the project success rate from 50% to 80%.
- 389% 3-year ROI
- 71% less unplanned downtime
Read this white paper to learn how federal agencies can create a tailored technology roadmap to support their eventual migration to the cloud, as well as the benefits of modernizing IT infrastructure to ease that transition. Government organizations can begin today by consolidating applications, simplifying IT operations, driving expanded automation, and
gaining greater management control of networks to ensure more agile and trusted computing environments in the future.
Author: Peach Tech
API security issues have caught many large organizations off-guard. This white paper outlines the challenges to scaling API security along with understanding the complexity and why automated API Security during development matters.
The importance of partnerships to securing the homeland can be seen every day. One of the most widely known partnerships is the "If You See Something, Say Something™" public awareness campaign. This campaign involves federal, state, local, tribal, territorial and private-sector partners to enhance the public's awareness of suspicious activity related to terrorism and terrorism-related crime.
IT security teams within federal government agencies and their contractors face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions. Their networks and
infrastructures are prime targets for nation-states, political agitators, organized criminals, and other hackers eager for access to truly critical content, be it for espionage purposes, to cause political embarrassment, or to reap financial gain. Furth ...
This eBook will guide you through how to assess and improve your threat hunting capabilities, how to prioritize what to hunt for, and share with you proven methods to track advanced threats within massive datasets generated from large, complex networks.
FedRAMP certification provides a well-vetted selection of CSPs for all Federal Agencies to choose from and enables the individual Agencies to choose the functionality each requires. However, FedRAMP certification does not ensure data security. That remains the responsibility of the Federal Agency that owns the data and places it in the cloud.
Now more than ever, data transmissions are an increasingly prevalent part of every military mission. From Headquarters to Tactical Operations Centers to the individual warfighter, the amount of data is massive and clear distinctions between classified and unclassified data transmission methods are progressively blurred. Top Secret and Secret classifications of data are well established and the methods for transporting these data types are known. But new methods are required to protect classified data as a result of the sheer volume of data, the time sensitive nature of ...
Author: Perkins Technical Services, Inc. (PTS)
PTS supports Soldiers by providing tactical radio Expeditionary Kits (E-Kit™). PTS E-Kit™ offers the solution for expeditionary tactical communications by enabling Soldiers to install their tactical radios in a command post in under 20 minutes. PTS E-Kit™ components include tactical radio docking station, DC power supply and quick install antennas supporting the currently fielded Harris, Raytheon and SINCGARS tactical radios. E-Kit™ components are configurable based on unit needs. PTS is committed to providing reliable quality products to the Soldier.
The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure information dominance and operational agility in the battlefield, the modern Warfighter requires innovative, lightweight, purpose-built infrastructure that supports mission-critical applications with rapid deployment, high availability, linear scaling and secure operations. Deploying such enterprise-grade data center solutions to the tactical edge with minimal physical footpr ...