Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

TACLANE Agile Performance Enhancing Proxy (PEP)
Author: General Dynamics Mission Systems   Send Email to POC   View Content
Our new TACLANE Agile Performance Enhancing Proxy (PEP) software feature will increase your network availability and accelerate the performance of your mission in disadvantaged networks. Secure your mission's success and request the PEP whitepaper today!

The Case for Secure Communications
Author: Blackberry   Send Email to POC   View Content
Today's communications landscape has migrated to mostly wireless communications. This doesn't mean that communications are more secure. In fact, it means that the attack surface has become much larger. Wireless traffic has the potential to be captured, listened to and even hijacked without any indication to those on either end of a call. The good news is that these communications can be protected with solutions that encrypt and secure voice and messaging communications so that even if its captured, it will reveal no usable information.

An In-Depth Guide to Meeting Federal Data Destruction Regulatory Compliance
Author: Security Engineered Machinery   Send Email to POC   View Content
Data security encompasses all aspects of information protection and has been an integral part of federal policy since the Social Security Act of 1934 made it illegal to disclose an individual's social security number and personally identifiable information (PII). Since then, numerous federal programs and processes specific to the privacy and security of personal, financial, health, and intelligence information have been instituted. In this guide you will learn how to successfully sanitize all classifications of government information, explore different types of media an ...

Defending the Tactical Edge at Machine Speed
Author: ManTech   Send Email to POC   View Content
Defending enterprise networks at the core is a challenge. Given the advances in active monitoring, data analytics, NOC/SOC technologies, and security information and event management (SIEM), we are now able to provide robust active defense mechanisms to protect the core enterprise. However, defending the tactical edge presents numerous additional challenges. To begin with, warfighters are often operating in a disconnected, intermittent and limited bandwidth (DIL) environment. Also, they are in hostile areas where concealing one's identity and operating in stealth mode i ...

IT Cadre's Transformation Support - Momentum at the most critical time
Author: IT Cadre   Send Email to POC   View Content
The first three to six months of any program will lay the foundation for success. Organizations that succeed drive the plan hard, confront the tough challenges early, achieve smart quick wins, and gain the early momentum that is critically important for the success of a transformation or program.


MEASURING SECURITY: Making Sense Out of a Modern-Day Tower of Babel
Author: AFCEA   Send Email to POC   View Content
Despite obvious and compelling needs for ways to measure security, AFCEA's Cyber Committee found that there is no consensus about how to measure security. To the contrary, its members found that the security metrics are all over the map with most organizations admitting in confidential discussions that they are not comfortable with the metrics they are using.

Storing and Accessing Data at the Edge
Author: NetApp   Send Email to POC   View Content
To effectively carry out its mission and keep the nation safe, DoD networks must provide uninterrupted access to intelligence and data that is gathered globally. It must then deliver that data easily, transparently and securely to military personnel. This will empower them to better execute their missions both on and off the battlefield.
With the advent of faster mobile communications and cloud-based artificial intelligence capabilities, data can be moved from the user in the field up to a cloud for processing and the results can be sent back to the user in near real ...

Attivo Networks® ThreatDefend™ Platform and the MITRE ATT&CK Matrix
Author: Attivo Networks   Send Email to POC   View Content
The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Matrix provides a model for cyber
adversary behavior, reflecting various phases of an adversary's lifecycle and the platforms they are known to target. It is designed
to help determine which technologies work or fail, identify gaps to improve security posture and processes, prioritize work on
detecting and deterring techniques, and to evaluate new security technology. ATT&CK is useful for understanding security risk
against known adversary behavior, planning security improv ...

AFCEA 2019 Army Signal Conference Solutions Showcase
Author: AFCEA   Send Email to POC   View Content
2019 AFCEA Army Signal Conference Solutions Showcase Compendium
Prior to the conference, the U.S. Army identified opportunities for industry to offer potential solutions to problems the service and joint force must address both today and in the near future. The list included cloud and application migration/enterprise/hybrid cloud strategy; data cleansing; total army asset visibility/configuration management; risk management framework optimization; continuous cyber security compliancy monitoring; insider threat, zero trust environment; and protected data.

This ...

A Portable, Capability-Rich Data Center
Author: Tyto Athene   Send Email to POC   View Content
Introducing a new intelligent edge solution, designed for federal communication and engineering teams focused on the rapid deployment of mission-critical capabilities at the tactical edge.
Acuity™ Micro Data Center by Tyto Athene delivers critical communications, applications, and information to deployed personnel, anywhere in the world.
Acuity combines best-in-class technology with mobility and efficiency to ensure readiness in a single form factor portable enough to fit in a commercial airline overhead storage compartment. Together, with leading technology par ...

A Beginner’s Guide to Link 16 Procurement
Author: ViaSat, Inc.   Send Email to POC   View Content
Link 16 has evolved as the modern battlefield needs have changed, first from coordinating Cold War air intercept missions to helping U.S. and allied forces maneuver in today's often complex operating environment. Since its development in the 1970s, it has become the most widely used, secure, jam-resistant line-of-sight waveform and continues to serve as the tactical data link of choice for air-to-air warfare. And with the new capabilities that are being delivered by the next-generation of Link 16 terminals, combined with the expansion of Link 16 into new domains, it is ...

Link 16 Breaks New Ground
Author: ViaSat, Inc.   Send Email to POC   View Content
With the introduction of the next-generation of Link 16 terminals, air-to-ground operations are being looked at in an entirely new way and have opened up more and more uses for Link 16. With the majority of our last two decades of air operations now involving air-to-ground actions, a significant focus has been placed on target delivery accuracy, fratricide and collateral damage reduction, and speed of engagement for DaCAS. However, these advancements in technology also require additional thought in terms of leveraging different approaches to the sharing and managing of ...

Unlocking the True Value of Encryption and Key Management Modes for Military Data Storage Applications
Author: Mercury Systems   Send Email to POC   View Content
Guns and guards alone can be used to protect high-value data, but it
is only a matter of a time before a sufficiently skilled and determined
enemy will find a way around these physical defenses. This method
is also impractical in situations where data is unattended outside the
walls of physical protection. The military system architect must design
for the worst-case scenario by assuming a storage device will eventually
fall into the hands of an enemy. Once this assumption is accepted, it is
the system architect's duty to implement a strategy where u ...

Multi-domain Operations and the Future of Training and Simulation
Author: STS International, Inc   Send Email to POC   View Content
Successful training and simulation capabilities require integrated decision-making during tactical, operational, and strategic operations. The development of computer-based, interactive, and multi-media simulation training platforms must consider the impacts of decision-making at each echelon to achieve the desired training outcomes, ranging from the individual to large formations to joint staff. As the operational environment grows more complex with new technology and meta-data, the Joint Force simultaneously moves into Multi Domain Operations (MDO). MDO describes ...

Modern Storage Accelerates Data Insights, Speeding Innovation
Author: Pure Storage   Send Email to POC   View Content
Deep learning opens up new worlds of possibility in AI, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up.

Read this MIT Technology Review custom paper to learn how advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics, helping to accelerate business outcomes.

AI, Analytics, and the Future of Your Enterprise
Author: Pure Storage   Send Email to POC   View Content
Is your organization capitalizing on the full potential of data analytics? In this big data primer, you will learn about the 3 key challenges facing organizations today: managing overwhelming amounts of data, leveraging new complex tools/technologies, and developing the necessary skills and infrastructure. However with a "tuned for everything" storage solution that is purpose-built for modern analytics, you can confidently harness the power of your data.

O'Reilly Deep Learning Book
Author: Pure Storage   Send Email to POC   View Content
Although interest in machine learning has reached a high point, lofty expectations often scuttle projects before they get very far. How can machine learning-especially deep neural networks-make a real difference in your organization? This hands-on guide not only provides the most practical information available on the subject, but also helps you get started building efficient deep learning networks.

Dive into machine learning concepts in general, as well as deep learning in particular
Understand how deep networks evolved from neural network fundamentals
Exp ...

Intelsat-29e Interference Mitigation Testing
Author: Intelsat General Corporation   Send Email to POC   View Content
Cyber threats are growing more advanced, with networks constantly under attack from entities in search of critical data to deny transmission or steal information. Intelsat EpicNG delivers reliability, security, performance and the flexibility to keep pace with changing geographic and mission requirements. Intelsat EpicNG's advanced digital payload creates an enhanced environment for battling interference and for mitigating jamming, assuring government organizations have coverage and providing connectivity for any operation. Intelsat EpicNG satellites successfully provid ...

2018 Trends in Cybersecurity: Building Effective Security Teams
Author: CompTIA   Send Email to POC   View Content
As cybersecurity has become more complex, traditional methods do not account for the wide range of issues related to securing corporate data and handling privacy concerns. New technology, improved processes and broad workforce education are all required for a modern security posture. Adopting a new approach requires cultural change within an organization, but it also requires a diverse set of skills. A new report by CompTIA examines the ways that businesses are building security teams, using internal and external resources, to assemble the expertise needed for security ...

Turning Data into a Strategic Asset for the Warfighter
Author: A3 Missions   Send Email to POC   View Content
Federal agencies increasingly need data-derived insights to address complex challenges, deliver mission success, and optimize resources for maximum effectiveness and efficiency. Whether the challenge is to contain a fast-spreading disease, model and monitor network activity, rapidly assess a battlefield, uncover fraud, or efficiently maintain a fleet of ships, the rapid exploitation of data is essential to getting the job done and providing situational understanding.

Formed in 2015, A3 Missions is a Georgia based LLC that specializes in Data Center Infrastructur ...