Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Optimizing Your Zero Trust Environment for Secure Video Conferencing
Provided By: Pexip   Send Email to POC   View Content   Oct 2021
Zero Trust is shaping the future of data security for government organizations. In this white paper, you'll learn what Zero Trust is, how it works, and why data-centric security matters. You'll also discover the role of data confidence, and why dynamic risk assessments will revolutionize everything we think we know about cybersecurity.

Layer 1 Matrix Switches provide ultra-secure, ultra-scalable, any-to-any connectivity for mission-critical Military Applications
Provided By: Netscout   Send Email to POC   View Content   Oct 2021
Applications that require a high level of security and guaranteed packet delivery are best served by a Layer 1 Matrix Switch. Many types of applications, from video distribution systems for command and control to large-scale cyber test ranges, require secure, high-performance packet delivery that a traditional networking infrastructure cannot provide. Learn more about three use cases for NETSCOUT's Matrix Switches and management software.

Managed Attribution: A Foundation for Effective Online Operations
Provided By: Ntrepid Corp   Send Email to POC   View Content   Oct 2021
Managed attribution (MA) is the process of controlling the technical and behavioral indicators that comprise your online identity (or attribution). By managing their attribution, operators, investigators, analysts, and researchers can construct an online identity that is consistent with their mission and may persist over time, allowing them to access social media platforms, dark web markets, and other online operational domains. This MA-enabled access allows users to pursue a variety of online missions without revealing their identity or organization. In short, effectiv ...

Cyber Range as a Service
Provided By: Technical Systems Integrators   Send Email to POC   View Content   Oct 2021
For companies that have or make use of production network infrastructures whether private or public, in the cloud or a hybrid, there is a need for developers, consumers of the infrastructure, and the administrators of the infrastructure to perform cyber training, testing, and exercises on a replica of their production infrastructure or Cyber Range. Delivering this Cyber Range as a Service (CRaaS) allows for the fastest and most economical way to for users to perform their required tasks. The myriad of services, applications, processes, methodologies, and tools such as t ...

Information Advantage Landscape
Provided By: Deloitte   Send Email to POC   View Content   Oct 2021
Multi-domain operations present the DOD with several challenges, such as dealing with biased data, using that information more effectively and cutting the data collection to decision loop.

Securing the Government Hybrid Enterprise
Provided By: Appgate   Send Email to POC   View Content   Oct 2021
Has your agency shifted from a fixed to a nebulous ecosystem of people, devices and systems? Luckily, we have the network security solution answer that can fully protect your government hybrid enterprise.

The Cyber Edge July 2021
Provided By: AFCEA   Send Email to POC   View Content   Sep 2021
The U.S. Navy is moving ahead at full speed to equip its assets with e┬Čective cybersecurity. However, the diverse nature of those assets, some are city-size ships while others are small but vital systems, confound planners seeking to ensure interoperable security measure.

Defend your Mission-Critical Data
Provided By: Qumulo   Send Email to POC   View Content   Sep 2021
Defend your Mission-Critical Data Every agency needs a robust business continuity strategy. A plan that is practical, cost-effective, and ready to protect against ransomware threats. Implementing secure and modern IT solutions to help minimize the attack surface to defend against compromises before they happen is an important component of the plan. Here are 5 best practices government agencies should keep in mind when developing a data protection plan and ensure the safety of valuable data.

Enabling Faster, Better Decision Making in Military Domains Leveraging Augmented Intelligence and Machine Learning
Provided By: Zapata   Send Email to POC   View Content   Sep 2021
Decision Support Systems (DSS) are valuable, and the military knows it. The integration of augmented intelligence (AI) which uses human-machine teaming, combines artificial intelligence and machine learning (ML) to make DSS even more valuable by enabling better, faster, and more informed decisions up and down the chain of command. This paper examines the merits of the various types of DSS, including the human-centered systems that currently prevail in command decisions. It also outlines the specific features and benefits of CASCADE, Zapata Technology's proprietary decis ...

Spirent 5G 2021: Market Drivers, Insights, and Considerations
Provided By: Spirent   Send Email to POC   View Content   Sep 2021
More than any previous generation of cellular technology, 5G has entered the popular consciousness. Even a global pandemic hasn't been able to slow down its momentum. With all the noise surrounding 5G, Spirent's experts have put together a guide that revolves around best practices to safely accelerate 5G.

Patch What Matters with Risk-Based Vulnerability Management
Provided By: Recorded Future   Send Email to POC   View Content   Sep 2021
Patching vulnerabilities is critical for protecting an organization's data and assets. 60% of breaches have been linked to a vulnerability where a patch was available but not applied. However, identifying which vulnerabilities are a priority is difficult, and relying on CVSS scores alone won't do the job. Of the 18,000 vulnerabilities identified in 2020, nearly 60% fell into the categories of "high" or "critical". To truly protect against vulnerabilities, organizations should employ risk-based vulnerability intelligence to understand which threats pose the largest risk ...

Public-Private Partnerships Key To Combatting Cyberthreats
Provided By: SolarWinds   Send Email to POC   View Content   Sep 2021
Adopting a security by design approach is helping SolarWinds improve its security while also promoting supply chain security with its customers.

The Cyber Edge October 2021
Provided By: AFCEA   Send Email to POC   View Content   Sep 2021
Coast Guard Embarks on Cyber Offense. The service blends its traditional maritime roles with expanded digital strengths to thwart adversaries.

Maximizing Efficiency with Virtual Workspaces
Provided By: Bluescape   Send Email to POC   View Content   Sep 2021
The speed and distributed nature of the modern public and private workplace means that getting the right teams and people aligned for a project can be challenging, as can coordinating and sharing information between those individuals. One way to do this is through virtual workspaces that can be applied to both existing physical spaces like meeting rooms and in a purely online setting.

Closing capability gaps to improve warfighters' real time situational awareness
Provided By: Elastic   Send Email to POC   View Content   Aug 2021
For warfighters, an important part of achieving real time situational awareness is getting the most pertinent and relevant information to commanders and other decision makers. Finding a way to do that is not only about business decisions, it's also about the way we make software and the way we roll out programs. Learn more about meeting the situational awareness goal from David Erickson, senior director for solutions architecture at Elastic.

Air Force IT modernization aims to streamline, speed up operations
Provided By: Akima   Send Email to POC   View Content   Aug 2021
The U.S. Air Force IT enterprise deals with a range of needs, from managing services such as help desk tickets to managing major initiatives such as cybersecurity and cloud migration programs. Governance, configuration management and a customer focus are the key components to its success. Learn more from Douglas Dudley, director of Air Force programs for Akima LLC.

Building Mission - Driven 5G Security with Zero Trust
Provided By: Booz Allen   Send Email to POC   View Content   Aug 2021
Now more than ever, national security missions must overcome risks around untrusted technology in a hyperconnected world. To enable resilient operations and shield sensitive data through these challenges, the Department of Defense is urging its senior leaders, engineers, operators, and contractors to embrace a "zero trust" security model for sensitive data, systems, and services, including fifth-generation (5G) mobile technology. All networks should leverage this mindset. And putting zero trust into action today with existing tools can mitigate emerging mission risks an ...

AFCEA TechNet Augusta Solutions Abstract
Provided By: AFCEA   Send Email to POC   View Content   Aug 2021
With assistance from the U.S. Army Cyber Center of Excellence and industry experts, TechNet Augusta 2021 is designed to open the lines of communication and facilitate networking, education and problem solving. This Solutions Review Compendium complements the event and helps builds engagement in advance.

Achieving Digital Transformation Within the Army
Provided By: BMC   Send Email to POC   View Content   Aug 2021
Learn how BMC's Gartner-leading SaaS ITSM solution, coupled with the immense power of AWS, can solve your enterprise service desk challenges. This e-Book explores why BMC is able to provide the highest-rated solution at the lowest cost, providing the opportunity for the fastest time to mission value, all while minimizing risk.

Cybersecurity Risk vs. Compliance: What is the Difference and Why It Matters
Provided By: SteelCloud   Send Email to POC   View Content   Aug 2021
Cybersecurity for computer networks and systems just keeps getting tougher every day. New attack vectors and threats occur by the hundreds on a daily basis. Protecting systems and data requires massive defensive vigilance and action on the part of CISOs, CTOs, CIOs and the personnel that work for them at multiple points in the value chain of serving up information systems services to a needy customer base. Cyber incursions are happening at scale, bad actors are behind them, and we have to eliminate or mitigate the risk. In government, compliance usually deals with a law ...