Resource Library:

AFCEA's trusted Resource Library offers a wide range of white papers, e-books, case studies, executive videos and analytical content. These documents may be relevant to your work and of interest to you as a member of the global cyber, defense, security, intelligence and technology communities. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact our advertising department by phone (703) 631-6181 or email or your SIGNAL account executive.

Filter the library by ...

   

Securing Data in Mission Partner Environments
Provided By: Varonis   Send Email to POC   View Content   Mar 2024
The only way to truly protect data in these environments is to assume that attackers are in the network, secure the data where it lives, and continually monitor user behavior for abnormalities.

MICROSOFT 365 COPILOT READINESS ASSESSMENT
Provided By: Varonis   Send Email to POC   View Content   Mar 2024
It's critical to improve your data security posture before your Copilot rollout. Varonis provides a free assessment that gives you a real-time view of gen AI risk in M365, automatically limits Copilot's data access, and alerts you to abnormal activity.

BETTER TOGETHER: VARONIS + MICROSOFT
Provided By: Varonis   Send Email to POC   View Content   Mar 2024
With Varonis, Microsoft customers get to the security outcomes they want, faster. Varonis expands the native capabilities of Microsoft in these key areas, helping initiate stronger controls and proactive risk reduction without impacting collaboration or productivity.

THE DATA SECURITY PLATFORM BUILT FOR THE AI ERA
Provided By: Varonis   Send Email to POC   View Content   Mar 2024
Your all-in-one platform to automatically find critical data, remove exposures, and stop threats. Varonis dramatically reduces the likelihood of a data breach in record-breaking time.

Discover How Identiv’s Unified Security Solutions Are Securing Hope and Safety for a Vulnerable Community.
Provided By: Identiv   Send Email to POC   View Content   Mar 2024
In a committed pursuit to enhance safety and foster a nurturing environment, Caritas Village teamed up with Identiv. At the core of this transformative journey was the amalgamation of cutting-edge technology with community-centric values to create a secure haven for the most vulnerable.

Enhancing Healthcare HR Management with Innovative Technology Integration.
Provided By: Identiv   Send Email to POC   View Content   Mar 2024
Explore this case study on how IGS and ADP Workforce Now helped modernize Valleywise Health's HR and security systems. This collaboration delivered a sophisticated solution that seamlessly integrates with existing infrastructure, improves operational efficiency, and ensures high security and data integrity standards. Learn about the specific challenges and innovative solutions implemented in this project.

2024 Global Threat Report
Provided By: CrowdStrike   Send Email to POC   View Content   Mar 2024
CrowdStrike is tracking 230+ adversaries and noting a record eCrime breakout time, the 2024 Global Threat Report unveils an alarming rise in covert activity and a cyber threat landscape dominated by stealth. Significant threat gains in data theft, cloud breaches, and malware-free attacks, show that despite advancements in detection technology, adversaries continue to adapt.

TAC: An Outpost for Government & Industry Technology Collaboration
Provided By: Technology Advancement Center (TAC)   Send Email to POC   View Content   Feb 2024
Our latest SIGNAL Executive Video Series features TAC, a nonprofit focused on innovation in the technology and cybersecurity space. TAC is committed to serving as a leading source of government-industry collaboration. Learn how it is achieving this mission and the different solutions TAC offers the community.

2024 Maritime Innovation Showcase
Provided By: AFCEA   Send Email to POC   View Content   Feb 2024
As global challengers threaten U.S. interests, we must continue to maintain maritime dominance-now and well into the future. From a historical perspective, a decade is but a moment. But at this moment, this critical decade, we must prepare our maritime forces for strategic dominance for many decades to come. AFCEA International is doing its part to share information, build partnerships and find solutions in this critical domain, to include hosting this Innovation Showcase that provides companies the opportunity to demonstrate cutting-edge solutions to government represe ...

Agile & Secure: Power Your Missions with SealingTech
Provided By: SealingTech   Send Email to POC   View Content   Feb 2024
Don't compromise on security. Unleash the full potential of your missions with SealingTech's expert-built cybersecurity tools and solutions.

The Story of Banshee: How Combat Veterans and Nokia Developed a Game-Changing Tactical Comms Solution for the Warfighter
Provided By: Nokia   Send Email to POC   View Content   Jan 2024
In our latest SIGNAL Executive Video Series, we learn about Nokia Federal's acquisition of the Fenix Group, a company of quintessential former special operators with significant expertise related to operating austere environments and the associated communications problems. Together, Fenix and Nokia are solving problems warfighters experience on the battlefield with the develop of Banshee and its line of products.

Achieving Zero-Trust Architecture: Culture Eats Strategy For Breakfast
Provided By: AFCEA   Send Email to POC   View Content   Jan 2024
Zero-trust architecture is often described as more of a cultural challenge than a technical one. "Never trust ... Always verify" is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. AFCEA's Cyber Committee tackles this topic in this white paper.

Quantum Resistant Encryption Emerges as Crucial Cybersecurity Solution for Federal Agencies
Provided By: Palo Alto   Send Email to POC   View Content   Nov 2023
In our latest SIGNAL Executive Video Series, we learn how cybersecurity experts are working on stronger, quantum-resistant encryption to safeguard against powerful technology that will be able to break keys in seconds that would take traditional computers millennia.

2023 THREAT HUNTING REPORT
Provided By: CrowdStrike   Send Email to POC   View Content   Nov 2023
79 minutes could bring your entire department to a screaming halt. The problem isn't malware-it's adversaries. To stop these adversaries, security teams must understand how they operate. In the 2023 Threat Hunting Report, CrowdStrike's Counter Adversary Operations team exposes the latest adversary tradecraft and provides knowledge and insights to help stop breaches.

The Cybersecurity Of Artificial Intelligence
Provided By: Ortman Consulting   Send Email to POC   View Content   Nov 2023
This topic paper explores the complexity and criticality of the cyber threats, vulnerabilities and respective defenses of Artificial Intelligence (AI). The following sections address the Advanced Persistent Threat (APT) as the principle adversary of concern for AI. Follow-on sections track the evolution of AI from fledgling information technology to cornerstone components of our global society's IT infrastructure, intrinsic vulnerabilities baked into these technologies, and the most appropriate defenses that should be explored and employed in the face of these threats a ...

Intelligence Drives the Decision Advantage
Provided By: Booz Allen   Send Email to POC   View Content   Nov 2023
America's ability to collect and process massive amounts of information, rapidly integrate new collection with existing data for contextual understanding and quickly produce accurate intelligence judgments is key to providing U.S. policymakers and warfighters with decisive decision advantage. Within intelligence circles, achieving decision advantage requires greatly accelerated tasking, collecting, processing, exploiting and dissemination of operationally useful information that informs timely decisions at all levels of our joint operating forces and government.

Data Is the Tip of the Spear in CJADC2
Provided By: MarkLogic   Send Email to POC   View Content   Nov 2023
Plenty of attention is being paid to the intricacies in executing CJADC2. The Army (Project Convergence), Navy (Project Overmatch), and Air Force (Advanced Battle Management System (ABMS)) all tackle communications and interoperability challenges within their domains, with the aim of eventually being able to cross-reference each other's devices for near-real time information.

The Top 10 Ways Federal Storage is Changing
Provided By: Hitachi Vantara Federal   Send Email to POC   View Content   Oct 2023
Are you curious about the exciting transformations happening in federal storage? Do you want to stay ahead of the curve and understand how these changes can impact your organization? Look no further! The eBook, The Top 10 Ways Federal Storage is Changing, is your guide to navigating the evolving landscape of storage solutions in the federal sector.

Threat Intelligence Helps Counter Cyber Adversaries
Provided By: CrowdStrike   Send Email to POC   View Content   Oct 2023
Today's cyber environment is a race between threat actors and organizations' information technology security staff trying to keep ahead of the next vulnerability. One valuable tool against online aggression from state and criminal actors is intelligence- getting the right information about threats and knowing when to act.

Top Considerations When Designing an Ergonomic Control Room
Provided By: Winsted   Send Email to POC   View Content   Oct 2023
To truly satisfy today's heightened ergonomic standards, console design has experienced a dramatic shift to deliver solutions that are smaller, with improved functionality and more appeal than ever before. Current console design is done with a more comprehensive, top-down approach to control room planning, examining every element of the console itself, as well as the overall layout of the room.

  NEXT PAGE >>
RSS Feed