Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Bodil Lund by phone (703) 631-6181 or email or your SIGNAL account executive.

Filter the library by ...


Putting Trust in Zero Trust
Provided By: Trend Micro   Send Email to POC   View Content   Aug 2022
The rising number and sophistication of cyber attacks against public and private sector organizations calls for a more comprehensive approach to organizational cybersecurity to supplement traditional firewalls and passwords.

Achieve Zero Vulnerability with Proven Appliance-Based Security
Provided By: Dell   Send Email to POC   View Content   Aug 2022
Today's DoD and IC technology teams are faced with a perilous balancing act. On one side are bad actors trying to break through network security to wreak havoc on systems and steal critical and sensitive data - or worse. On the other side is a growing remote or hybrid workforce that increasingly requires seamless, secure access to classified networks and assets from points located outside of the traditional physical security perimeter. The reality is that breaches don't have to be inevitable. To create a truly secure environment, cybersecurity needs to start at the begi ...

The Risks of BYOD and Using Virtualization to Eliminate Risk and Preserve Privacy
Provided By: Hypori   Send Email to POC   View Content   Aug 2022
Secure, remote access to enterprise apps and data from the edge is the key to connectivity, increased productivity, and economic sustainability in today's remote work environment but heavy reliance on mobile devices with their inherent security risks creates vulnerabilities for both enterprises and end-user privacy. We must reconsider how we access and engage data from the edge and use virtualization to eliminate the risks associated with BYOD and to preserve end-user privacy.

What is the Cost of Bad Software?
Provided By: Bluescape   Send Email to POC   View Content   Jul 2022
Lawmakers are taking a hard look at how much underperforming software is costing the Department of Defense (DoD) in lost productivity and resources, and the results could be enlightening. Learn more on the root causes of software inefficiencies at the DoD and what high-performing software truly looks like.

Zero Trust for DevSecOps
Provided By: Appgate   Send Email to POC   View Content   Jul 2022
Provide secure, dynamic and direct access to multiple cloud accounts while improving speed and productivity of developer teams. Developer teams need to work across multiple cloud accounts without restrictions or delay at a cadence and workflow that allows for maximum productivity. Security teams need to ensure they don't impede the speed of work and innovation while consistently securing access to workloads in development, testing and production environments. They need to avoid imposing massive delays on development teams waiting for permissions to do their jobs. What's ...

Focusing Modernization Through Business Integration
Provided By: KPMG   Send Email to POC   View Content   Jul 2022
As the federal government moves to achieve its digital transformation goals, agencies and the chief information officers (CIOs) responsible for integrating new technologies should adopt a business-focused approach that ensures the delivery of mission value.

Improving the Reach, Resiliency and Relevancy of Link 16
Provided By: ViaSat, Inc.   Send Email to POC   View Content   Jul 2022
As military operations become more dependent on networked sensors and shooters seamlessly working together, there is a greater need for sharing critical information in real time to meet today's and tomorrow's challenges. Resilient waveforms such as the Link 16 tactical data link will be key components in the U.S. Department of Defense's (DoD's) approach to networked warfare. Introduced 40 years ago to coordinate NATO air defenses during the Cold War, Link 16 communications continue to evolve into smaller and more diverse form factors, going from theater commands to indi ...

Enabling Innovation Through Secure Hybrid and Remote Collaboration Tools
Provided By: Bluescape   Send Email to POC   View Content   Jul 2022
We are living through a pivotal moment in history. The technologies that will determine the shape of our new century-like artificial intelligence, quantum computing and digital engineering-will come of age this decade. In the era of near-peer competition, innovation means moving with the speed and agility of software. But it also requires security, so that our hard-won advances don't end up being stolen by enemy hackers and weaponized against us.

Enterprise Tools that Modernize, Innovate and Defend the Navy's Digital Transformation
Provided By: Elastic   Send Email to POC   View Content   Jul 2022
The U.S. Navy is modernizing how it fights and operates in the modern battlespace by focusing on how information from sensors and other systems can quickly get to warfighters to help them make decisions, creating the need for a mission-proven technology platform to achieve a variety of digital transformation use cases. Most of these efforts fall under the Department of the Navy's Information Superiority Vision, which aims to upgrade the service's infrastructure, develop and deploy new capabilities, and defend Navy data from cyber attack.

5G Wireless Opens New Horizons for Government Users
Provided By: Nokia   Send Email to POC   View Content   Jul 2022
The U.S. government is working with commercial businesses to test and develop faster, next-generation 5G wireless technology-based applications for use in a variety of environments, from warehouses to the battlefield. Such networks just now are rolling out in the commercial sector and offer government users the possibility to provide enhanced, high data, high bandwidth communications and computing for everything from tactical data networks to managing fleets of autonomous vehicles.

Garrison Security Enables Timely Access to Open Source-Intelligence
Provided By: Garrison   Send Email to POC   View Content   Jul 2022
In the years since, amateur and activist open-source intelligence collectors and analysts such as Bellingcat and the Syrian Human Rights Observatory have demonstrated the decisive impact that exploitation of opensource intelligence, or OSINT, even by nongovernment actors, can have on unconventional and hybrid conflicts.

Making the Case for a Federal Bureau of Statistics
Provided By: AFCEA   Send Email to POC   View Content   Jul 2022
AFCEA International's Cyber Committee is pleased to present this white paper as part of the members' series of white papers designed to inform an evolving national cybersecurity strategy. This paper, focused on recommendations of the Cyberspace Solarium Commission pertinent to a Bureau of Cyber Statistics, represents a program issue, given that it discusses a capability the commission believes required to strengthen the cybersecurity of the United States.

2022 Technology Vectors Update by the AFCEA Technology Committee
Provided By: AFCEA   Send Email to POC   View Content   Jun 2022
The 2022 Technology Vectors Update by the AFCEA Technology Committee is an annual presentation on current technology trends and provides insights and expertise in emerging technology topics most relevant to federal technology leaders.

Fortifying the Nation's Changing Emergency Preparedness Plans
Provided By: AFCEA   Send Email to POC   View Content   Jun 2022
The increasing adoption of remote/telework policies by federal departments and agencies - combined with more severe and frequent natural disasters and manmade threats - challenge traditional plans for federal continuity of operations and continuity of government (COOP/COG). The U.S. Federal Emergency Management Agency's Community Lifelines offer a framework for considering a Shelter in Place Continuity of Operations approach, and this paper uses that framework to fortify planning for a remote workforce.

OSINT Technologies: Safe Online Data Collection
Provided By: Ntrepid Corp   Send Email to POC   View Content   May 2022
OSINT mediums are ever-changing, and therefore, collecting this information is both an art and a science. Finding the most effective and secure OSINT technologies have a lasting impact on investigations. Conveying the sentiment coined by William Gibson, the street finds its own uses for things, OSINT technologies must change even faster than the mediums that contain it. Investigators require technology with a predictive development cycle, one that allows them to outrun adversaries to their next playing field. Smart security involves using the right OSINT technology and ...

10 Ways to Win with GovCon Reporters at Trade Shows
Provided By: Boscobel Marketing Communications   Send Email to POC   View Content   May 2022
It is important for government contractors to work with reporters to bring awareness to their company, brand and solutions. Understanding what works best for reporters to develop a story facilitates collaboration and trust. Trade shows present a great opportunity for companies to connect with reporters. Here are 10 best practices to ensure that you create these vital relationships.

The Danger of Cognitive Stress on Tactical Cyber Operations
Provided By: AFCEA   Send Email to POC   View Content   Apr 2022
Cybersecurity professionals, especially on-net defenders, experience striking similarities to stress-inducing factors as do first responders. While discussions at cybersecurity conferences dating to 2018 noted a significant rise in burnout, depression and suicide in the community, no official studies exist to date. This white paper, written by members of AFCEA International's Cyber Committee, seeks to educate readers on contributing factors of the current cultures, the potential role of "gamification" to impact behaviors and recommendations to address the issue.

Uplevel to a Virtual Workspace
Provided By: Bluescape   Send Email to POC   View Content   Mar 2022
Uplevel to a secure virtual workspace to support Federal workforce reentry. In today's work environment, dispersed teams often struggle to collaborate, brainstorm and communicate efficiently. Download this infographic to learn five ways online whiteboards support hybrid work modernization.

Embracing Zero Trust: A Guide for Agencies to Address the Cybersecurity Executive Order
Provided By: Lookout   Send Email to POC   View Content   Mar 2022
The Cybersecurity Executive Order has agencies committed to taking a more proactive stance against the rapidly intensifying surge of phishing and ransomware attacks against our nation. The Lookout security experts have put together this eBook to help guide you through your Zero Trust journey. Some of the valuable insights and resources. To help accelerate the adoption of Zero Trust and Threat Intelligence strategies, it's important to first understand how to protect data from endpoint to cloud. Discover how a comprehensive Zero Trust strategy can make security an enabler.

Supply Chain Cybersecurity
Provided By: AFCEA   Send Email to POC   View Content   Mar 2022
Supply Chain Cybersecurity includes a complex of everyday operating issues affected by a network of known and unknown connections, services and components. In this white paper, the AFCEA Homeland Security Committee provides a strategic overview of the supply chain cyber issues from the perspective of vendor operational security.


RSS Feed