AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
Hexagon US Federal's hub and spoke approach to computer-aided dispatch *(CAD) provides an alternative to a standalone independent system. This solution enables installations to share information on a common platform and create a state of interoperability between the various participating individual U.S. Army Installations' Directorates of Emergency Service (DES), regionally and Army wide. This whitepaper provides an overview of our approach, identifies some of its advantages, and provides examples of where it is successfully working today.
For most Federal Government institutions, budgets are tighter than ever. While short-staffed teams work to modernize their data centers by saving money through virtualization, the latest storage appliances and the cloud, their data volumes continue to explode and end users are demanding access to data 24.7.365. This places a heavy burden on IT, making it a challenge to meet SLAs and provide consistent availability to data and applications. Veeam® Availability Suite™ combines the award-winning data Availability and virtualization management expertise of Veeam Backup & R ...
Federal requirements for nonfederal organizations to safeguard Controlled Unclassified Information (CUI) are changing. Many of the organizations affected by these changes may underestimate the scope of the requirements and the implications associated with nonconformities. COACT has identified the requirements associated with these specific changes and described how the National Institute for Standards and Technology (NIST) Special Publication (SP) 800-171, Revision 1, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, rel ...
Every federal government agency faces serious and persistent threats from both inside and outside their digital networks. Yet mitigating risks and preventing breaches is challenging, as agencies are typically hampered by restricted budgets, legacy systems, and scarce resources.
Unisys steps into this gap with Unisys Stealth®, a software-defined security portfolio that delivers consistent, reliable security for global enterprises focused on protecting data in their data center, cloud, and mobile infrastructures. By substituting traditional hardware security techno ...
The concepts of network visibility, network monitoring, and network blind spots help you understand what is happening on your network. While some of the terms can be intimidating at first, straightforward definitions eliminate the confusion. Read this book, which is a compilation of blog posts from Ixia network visibility experts, to get a quick and clear understanding of the terminology associated with network monitoring. Over 20 terms are explained. In addition, examples throughout the text provide ideas on how the concepts can be useful to IT networks. See for yourse ...
Author: TwentyEighty Strategy Execution
In many agencies, there has been advancements in program improvement and process innovation. However, the threat to such initiatives lies in the failure to attain the targets and metrics for success. Often times, improving project management has as much to do with changing hearts and minds as it is with getting down to the business of putting actual programs and initiatives into action. If you're not claiming that your projects fail, then you've been re-setting the clock on your schedule and adjusting your costs and budget.
This article discusses:
- The "easy" ...
Author: TwentyEighty Strategy Execution
Agile project managers have a range of metrics from which to choose for tracking a project's progress. Understanding these metrics enables them to determine how and when to use them most effectively to perform one of the key functions of Agile: communicating progress to the customer. Because the sheer number of options can be daunting, TwentyEighty Strategy Execution boiled down the hundreds of metrics tracking approaches to offer you a comprehensive list-with explanations-of the most useful ones to project managers today.
Author: Carbon Black
Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions that tackle hacking, the Center for Internet Security Critical Security Controls for Effective Cyber Defense offers guidance for prioritizing security processes, and standardization and automation are among its 20 Critical Security Controls derived from frameworks such as NIST SP 800-53. Carbon Black experts describe some of the simple defense measures your organization eas ...
You are responsible for your organization's network security and performance management and the concept of network visibility has been introduced to you. But what is Network Visibility? How does it help you optimize performance and keep your network defenses strong? Download this e-book to learn how to use a visibility foundation to access all traffic, and protect and deliver the information you need for a great customer experience.
Author: TwentyEighty Strategy Execution
Although the Agile movement was the brainchild of the software development and IT world, it has grown and evolved. There is no question that today Agile project management can be, and has been, applied successfully to a broad range of projects. This mindset focuses on the delivery of value to the customer, rather than strict compliance to a rigorous set of procedures, and values inventiveness and innovation over predictability and unchanging processes. When implemented effectively, Agile drives a collaborative effort between the project team and end user where the focus ...
Today's IT staffs are challenged, dealing with the avalanche of big data and computing necessary to remain competitive. Uncompromised visibility, where the organization has end-to-end views of each and every critical packet, becomes a business imperative, with a best-in-class visibility platform enabling your security and performance tools to be much more effective.
In this paper, learn:
How to avoid "network blind spots" that increase the risk of security breaches and possible data loss with performance repercussions Which features on industry-standard networ ...
Author: Carbon Black
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to "go on the hunt." This guide introduces the concept of threat hunting and the role it plays in the protection of your organization's systems and information.
The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M. Gilday, USN, describes the challenges facing the sea service in cyberspace.
- Research into quantum security already is leading to applications in that esoteric area.
- A new commercial approach to cybersecurity effectively renders a network invisible to attackers.
- Cyber warriors must change their tactics on the fly as adversaries continue to innovate.
Since the early days of World War I, forces have struggled with how to integrate air power to achieve decisive effects on the battlefield on the ground. The key issue that has remained constant for over one hundred years has been the difficulty in seamless communications between supporting aircraft and ground forces in order to establish a common understanding of the situation on the battlefield, locations of friendly and enemy forces, and the desired effects required by ground forces from their supporting aerial components.
With the advent of the Battlefield Awa ...
Author: IT Cadre
Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a networked world. However, this improved productivity comes with new risk. For many organizations, information is the most valuable asset they possess. Their existence is tied to their ability to both use and protect this vital information. Protecting that information has to span the complex environments of corporate owned storage networks, individual workstations, cloud se ...
Author: Avaya Government Solutions
Avaya delivers a solution set of next-generation capabilities that address the challenges of the everywhere perimeter. It provides a foundational layer that seamlessly manages hyper-segmentation, native stealth, and automatic elasticity across the organization. Using software-defined and identity technologies to automate onboarding and access from users, devices, networking nodes, and servers, Avaya makes protecting and managing everywhere access practical.
Author: AccessData Group
This paper explores the complexities and challenges facing law enforcement in managing digital evidence as it makes its way through digital forensics and investigative workflows. We will discuss new approaches, emerging technology solutions and best practices for law enforcement professionals as they transform their capabilities to leverage digital data to bring criminals to justice.
Author: Ascolta, A Vion Company
Today's advanced predictive analytics reverses the historical paradigm of how we interact with data. In the past, data collected by businesses, governments and organizations has been analyzed in a forensic manner. In other words, the analysis is always looking back at what has occurred, without much capability to use the historical patterns in a predictive way. Make no mistake, this approach had some real benefits, but without the more sophisticated big data and analytic capabilities available today, the predictive element has been more guesswork than science until now.
Many agencies believe they aren't actually subject to cyber-threats from mobile devices because, simply, they don't currently allow personal mobile devices to access their networks. Ultimately, however, this posture puts the government and its data at risk because federal agencies have a BYOD program whether they like it or not. After analyzing 20 federal agencies, Lookout discovered 14,622 Lookout-enabled devices associated with government networks. That means people are connecting their phones to your systems. What's more is that the frequency of serious mobile threa ...
Author: Spirent Federal
A penetration test (or more commonly, "pentest") is a software, infrastructure and or network attack on your organization by a skilled attack team that probes for security weaknesses and seeks to exploit them to reach your assets.
The testing team surveys the breadth of potential damage that can be done in an attack, and delivers a report, associating a level of risk with each vulnerability they discover. A pentest report helps an organization prioritize its security weaknesses and reduce risk.