AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
Provided By: Keysight Apr 2021
The DoD's Software Acquisition Pathway makes it clear: test automation is central to command and control.
Provided By: Keysight Apr 2021
Regulated environments require the best in non-invasive software testing.
Provided By: SDL Apr 2021
Raytheon's long-term relationship reaps rewards For over 30 years Raytheon has counted on XPP, the highly scalable, high-quality publishing tool, to deliver critical updates for the Patriot missile system to military customers around the world. Read our case study to see how our technology has helped Raytheon deliver a vast amount of tech doc updates each and every year.
Provided By: SDL Apr 2021
Content is the infrastructure that connects civilization to commerce, innovation, and for the organizations who know how to harness it, dominance in the digital world. It not only drives the modern digital customer experience, but also is critical to business intelligence
and inter- and intra-enterprise collaboration.
Provided By: Booz Allen Apr 2021
Longstanding proven approaches used by the Intelligence Community must change as technologies, such as artificial intelligence and machine learning continue to evolve and as 5G expands. That's going to be really uncomfortable say Booz Allen Hamilton's Judi Dotson and Brian Green. In a recent video, the two executives talk about the driving forces of change in the IC, in DOD and across critical infrastructure and how your organization can benefit from this transformation.
Provided By: Akima Apr 2021
Supply chain security. A global pandemic. Complex acquisition models. These are just a few of the challenges impacting the manufacturing, prototyping, and other advanced systems engineering needs of the federal government. In this interview, Zach Conover, General Manager of Akima subsidiaries Lynxnet, Truestone, and Aperture Federal, sits down with the Editor & Chief of Signal Magazine to discuss these issues, as well explore how the Akima portfolio of companies is ensuring it can rapidly deliver best fit solutions in support of today's warfighter in our "new normal." ...
Provided By: MITRE Engenuity Apr 2021
What is the industry's state of knowledge of MITRE ATT&CK vs. the ability to apply it at work? How are organizations utilizing ATT&CK? What ATT&CK-based technologies is the community using? What percentage of the community has done a thorough mapping of their defenses to ATT&CK? Does the community know how to build an ATT&CK CTI product? Does the community have an interest in learning more about how to apply ATT&CK? Are practitioners gaining the advantage over the adversary with ATT&CK, or mainly playing catch up chasing traditional IOCs?
Provided By: Markforged Apr 2021
The U.S. Department of Defense is looking at additive manufacturing technologies to rapidly prototype and build equipment components and increasingly, to potentially make replacement parts in the field. X-Fab is one example of the government's interest and support for additive manufacturing technologies. Learn more in this video interview with David Benhaim, co-founder and chief technology officer for Markforged, which develops and makes additive manufacturing equipment and software.
Provided By: Endace Apr 2021
As distributed applications and cloud services have become commonplace, the increased complexity in network and application architectures has made it challenging for teams to ensure the reliability, performance, and security of enterprise networks. These complex environments open more attack vectors for exploitation while making it difficult or impossible for security teams to quickly determine what has happened in the event of a security incident. This has led to the need for organizations to capture complete information about network activity and provide it to securit ...
Provided By: Varonis Apr 2021
The NSA has recommended all federal agencies and contractors adopt a Zero Trust security model. This document shows how Varonis aligns with the NSA guidelines and how we can help organizations achieve a mature Zero Trust environment.
Provided By: Crestron Apr 2021
The place workers call the office and the way they work and collaborate has forever changed. Today, workers are scattered between offices, homes, and other remote locations. At Crestron, we are proud to chart the path forward as we explore the future of work and solutions that strengthen our connections with people, anywhere they may be.
Provided By: Attivo Networks Mar 2021
Giving the right user secure access to a system, resource, application, or network hinges on one thing - accurately confirming the user's identity. Organizations often rely on directory services such as Active Directory (AD) to authorize account access verifying a username and password combination. The problem is that attackers can steal and misuse these credentials for malicious purposes, and the organization would never know. Since the credential is valid, the attacker gains access to everything the legitimate user has access to. If attackers steal credentials that ha ...
Provided By: SpiderOak Mar 2021
This following white paper will provide readers with an overview of SpiderOak's CrossClave product capability. CrossClave is a secure communication and collaboration solution that leverages no-knowledge encryption and an industry-unique deployment of blockchain/distributed ledger to provide users with a level of confidentiality and security unavailable until now in this marketspace.
Provided By: OnSolve Mar 2021
How Can Your Organization Use Critical Event Management? A crisis can take us from calm to chaos in seconds. Whether it's a hurricane or a wildfire, a plane crash or a plant explosion, a local outbreak or a global pandemic, your organization needs the capabilities to bring more control to chaos, now more than ever. The OnSolve Platform for Critical Event Management lets you do just that, with pinpoint accuracy that's 90% faster than traditional one-dimensional modeling. This ebook explores: The three parts of critical event management (CEM) A scenario based on actual ev ...
Provided By: Markforged Mar 2021
Find out why Team CoSTAR turned to Markforged 3D printers as they competed in the DARPA Subterranean Challenge with Nebula, the team's autonomous robot that had 15 Markforged 3D printed parts. The team could count on the robustness of the Markforged printers, the reliability and repeatability of parts produced, and the fact that the Digital Forge creates beautiful, functional parts that do not require any post-processing. This challenge is a starting point to work towards enabling underground exploration of the moon, Mars and beyond.
Provided By: ViaSat, Inc. Mar 2021
In what seemed like science fiction only a few years ago, artificial intelligence empowered unmanned systems teaming with manned platforms are shaping up as the path for future operations.
Provided By: Endace Mar 2021
As cybersecurity threats become more sophisticated, organizations need a way to quickly detect and stop an attack or track and analyze its aftereffects for clues. Deep packet analysis, or packet sniffing, is a data processing technique that allows organizations to monitor network traffic for signs of intrusion, block or reroute it if an attack is detected, and most importantly, record data traffic, allowing analysts to conduct detailed investigations into the nature of a cyber incident.
Provided By: SixGen Mar 2021
It appears that once a new data breach makes it to the public, there are conversations that follow wanting to highlight the demand for cyber security professionals. Recent data confirms trends from prior years that the information warfare domain is a risk that every organization needs to account for.
Provided By: Ribbon Mar 2021
Whether supporting missions downrange on the battlefield or supporting citizens down the street when a natural disaster hits, the U.S. government needs secure communications that are easy to deploy and easy to use. Security, ease of use, reliability and scalability are critical to any mission-critical environment and Tactical Core and Tactical Edge help smoothly transition to the next generation of solutions.
Provided By: CyberArk Mar 2021
With the advent of CI/CD pipelines, supply chain attacks have become more prevalent, and as the recent SolarWinds breach has demonstrated, the impact of such breaches can be vast and rippling. This eBook addresses questions raised by security leaders that want to better understand their organization's development environments, the risks development tools expose and the best practices and approaches for securing them. Review best practices to securing developer endpoints, the applications being developed, as well as the tools and admin consoles used to run CI/CD pipeline ...