Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Application Load Balancing Key Considerations for Federal Agencies
Provided By: Kemp Technologies   Send Email to POC   View Content   Feb 2021
There are several key issues to consider when comparing top load balancer manufacturers for federal government use and ownership strategy that can significantly impact Total Cost of Ownership and Return on Investment. Load balancers enable the security, availability and performance of network-based applications by providing a number of services and functions. Check out this whitepaper and see what are the most important factors when choosing the right solution for your environment.

China, Cyberspace and Hybrid State Power
Provided By: AFCEA   Send Email to POC   View Content   Feb 2021
The rise of China as a peer competitor vying for superpower status has emerged as an important challenge for the United States. The AFCEA Cyber Committee opens the discussion of China's hybrid approach to the use of power, particularly in cyberspace, as a competitor to the United States. Internal and external governance and to its application on the battlefield are two facets of China's approach.

Chaos to Control: An Exploration of Modern Critical Event Management Use Cases
Provided By: OnSolve   Send Email to POC   View Content   Feb 2021
How Can Your Organization Use Critical Event Management? A crisis can take us from calm to chaos in seconds. Whether it's a hurricane or a wildfire, a plane crash or a plant explosion, a local outbreak or a global pandemic, your organization needs the capabilities to bring more control to chaos, now more than ever. The OnSolve Platform for Critical Event Management lets you do just that, with pinpoint accuracy that's 90% faster than traditional one-dimensional modeling. This ebook explores: The three parts of critical event management (CEM) A scenario based on actual ev ...

Mapping Humanity with Machine Learning
Provided By: Fraym   Send Email to POC   View Content   Feb 2021
Ben Leo, CEO & Co-Founder of Fraym, speaks with the Editor & Chief of Signal Magazine about the mega trends driving the geospatial analytics market including pandemic preparedness, response, and disease, global power competition, inequity and insecurity, and climate impact and vulnerability. Fraym uses machine-learning models to generate hyper-local insights on communities around the globe. The company's location-based data about population characteristics and behaviors is employed by governments and organizations tackling some of the world's most pressing challenges.

The Cyber Edge January 2021
Provided By: AFCEA   Send Email to POC   View Content   Feb 2021
When the GAO performs cybersecurity-related audits and reports its findings, the watchdog provides key recommendations to agencies to improve their networks and information technology from risks. The GAO also follows up to see how an agency implemented those recommendations.

Achieving Digital Transformation at Army PEO EIS
Provided By: BMC   Send Email to POC   View Content   Jan 2021
Learn how BMC's Gartner-leading SaaS ITSM solution, coupled with the immense power of AWS, can solve your enterprise service desk challenges. This e-Book explores why BMC is able to provide the highest-rated solution at the lowest cost, providing the opportunity for the fastest time to mission value, all while minimizing risk.

Strengthening the Nation's Cybersecurity Strategy, Part Two
Provided By: AFCEA   Send Email to POC   View Content   Jan 2021
The AFCEA Cyber Committee is pleased to present the second in a series of white papers designed to inform an evolving national cybersecurity strategy. While many cybersecurity recommendations focus on federal government activities, including civilian
 and military components, the committee recognizes the vital role that state and local authorities and stakeholders must play to safeguard the nation's civil, critical and business infrastructures. A one-size-fits-all model doesn't exist because local government organizations vary in size and complexity, cyber capability an ...

AFCEA TechNet Augusta Solutions Showcase
Provided By: AFCEA   Send Email to POC   View Content   Jan 2021
AFCEA International is hosting TechNet Augusta in an exciting and diverse format. The conference's series of information-sharing events began with the Army's request for industry capabilities proposals to some of its most difficult problems. Members of the association's Technical Committee reviewed more than 60 potential solutions. This document features these solutions, which have been made available to the Army's leaders, program managers and technologists

How a Government Defense Ministry used Coordinated Cyber Training to Counter Imminent Threats, Develop Operator Skills
Provided By: Circadence   Send Email to POC   View Content   Jan 2021
Cyber security experts estimate that 90% of cyber-attacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to DOD's Principal Cyber Advisor.

U.S. Air Force Expedites Mission Capabilities Leveraging ML
Provided By: TAMR   Send Email to POC   View Content   Jan 2021
The United States SEEK EAGLE Office (AFSEO) is the center of excellence responsible for managing the aircraft store compatibility process. Get an insider's look at how AFSEO leveraged ML to accelerate time to insights by automating entity resolution, record duplication, and categorization. Learn how the office is able to increase ROI and utilization of Air Force aircraft.

5 Ways AI, IoT, and security are shaping the API economy
Provided By: Mulesoft   Send Email to POC   View Content   Dec 2020
Artificial intelligence (AI), the internet of things (IoT), and security technologies are set to disrupt every industry in the next decade. To get there, leading organizations like McDonald's, Uber Eats, and HSBC have built adaptable digital platforms via APIs. In the ebook, MuleSoft founder Ross Mason shares his point of view on how to build a thoughtful API strategy that will help your organization take full advantage of emerging technologies like AI, chatbots, and IoT without compromising on security.

Certainty in an Uncertain Age
Provided By: Regions Bank   Send Email to POC   View Content   Dec 2020
The COVID-19 pandemic has precipitated an unprecedented international economic contraction. Many companies will face challenges. One factor that will distinguish the winners from the losers is the financial flexibility to seize M&A opportunities; invest in new, profitable lines of business; and keep teams with valuable and hard-to-replicate skillsets together through tough times. Even more critical is the ability to have a diversified business that is resilient enough to weather any storm. A business with a well-diversified customer base and product offering is likely t ...

Multi-Domain Secure Systems Aid Remote Government Workers
Provided By: Forcepoint   Send Email to POC   View Content   Nov 2020
Intelligence community and government personnel who work with classified or sensitive information often use multiple computers on their desks, each one connected to a separate network based on the security level of the information being accessed.

This can create a variety of IT and logistical challenges for workers
onsite, but as ongoing COVID-19 pandemic and other circumstances force more people to work remotely, managing all of this equipment and their security requirements from a private home can be difficult or nearly impossible without multilevel secure ...

Attivo Networks in a Zero Trust Architecture
Provided By: Attivo Networks   Send Email to POC   View Content   Nov 2020
Most organizations will start Zero Trust with a focus on users and devices. Attivo Networks adds another layer of access control that focuses on applications, data, and access for post-authentication protection. The company's ThreatDefend platform offers capabilities that implement elements of a Zero Trust architecture, particularly in the areas of data trust and application trust.

Strengthening the Nation's Cybersecurity Strategy
Provided By: AFCEA   Send Email to POC   View Content   Oct 2020
Cybersecurity and its relationship to the national interests have evolved swiftly and will continue to do so. AFCEA International's Cyber Committee offers strategy recommendations as a result of numerous studies and commissions. This is the first in a series that will highlight specific recommendations that merit action now and in the next four years.

The Cyber Edge September 2020
Provided By: AFCEA   Send Email to POC   View Content   Oct 2020
A Cyber Thread Runs Through Government Future Assessments.
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas.

Faster Deployments for the Electronic Battlefield
Provided By: Abaco   Send Email to POC   View Content   Oct 2020
Invisible conflicts on the electronic battlefield are won or lost in tiny
fractions of a second. Adversaries are continually deploying new or modified threats. Our warfighters are at risk if they're not equipped to respond.

Enterprise-class Mission Control
Provided By: Veeam   Send Email to POC   View Content   Oct 2020
Government agencies are accountable for properly handling sensitive data. Civil servants operate in an environment based on close oversight, prescriptive procedures and rules. As the trusted custodians of that data, they need to take careful and necessary precautions to protect it, which can slow mission progress.

A Single Solution that Delivers Unparalleled Data Availability
Provided By: Veeam   Send Email to POC   View Content   Oct 2020
Availability Suite enables customers to achieve unparalleled data availability, visibility, automation and governance across data centers, at the edge and in the cloud. As modern IT organizations look to innovate faster, legacy backup and recovery infrastructure cannot support customers' forward-looking initiatives.

Your Office is in the Cloud
Provided By: Veeam   Send Email to POC   View Content   Oct 2020
In 2017, the White House's American Technology Council advised federal agencies to move IT operations in the direction of shared services and cloud modernization. Congress provided funds for digital transformation through the Modernizing Government Technology Act, and many agencies took advantage of the opportunity to make upgrades.