AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
Provided By: archTIS Dec 2021
The new U.S. Presidential Cybersecurity Executive Order for Zero Trust requires US Federal agencies to transition to a Zero Trust Architecture (ZTA). These new ZTA recommendations still do not effectively address the data security challenges. In this new Technology Brief we discuss the ramifications of this executive order and how to extend zero trust to the data itself. Read the Technology Brief to learn: How traditional zero trust architecture addresses network and application security, not the data that sits behind them. How this zero trust 'blindspot' leaves agencie ...
Provided By: AFCEA Dec 2021
High-speed Internet access is critical to economic opportunity, job creation, education and civic engagement. All Americans, whether living and working in cities or the nation's rural areas, need reliable and ready access. This white paper, prepared by members of AFCEA's Cyber Committee, reviews some of the major government programs to improve nationwide availability of broadband and offers suggestions for how and why the private sector should participate. It also investigates the security and national competitive implications of the lack of reliable broadband Internet ...
Provided By: Redcom Nov 2021
The Zero Trust Architecture (ZTA) has rapidly become the hottest topic in cybersecurity. However, REDCOM has noticed that today's discussions inevitably focus on ZTA from the standpoint of the enterprise, ignoring the nuances and pitfalls of implementing ZTA in the tactical domain. Instead of driving the ZTA solely from the top-down, REDCOM is seeing an operational benefit in constructing the enterprise ZTA from the bottom-up. This paper will delve into the potential issues with the industry's current approach and introduce our solution, REDCOM ZKX. ZKX changes the secu ...
Provided By: Tanium Nov 2021
On May 12, 2021, President Biden signed an Executive Order (EO) to improve the nation's cybersecurity and protect federal government networks. True improvement necessitates the adoption of modern approaches and practices, with the most critical element being enterprise wide, real-time visibility and control. As proven by numerous recent cyber events, federal agencies cannot rely on prevention and detection capabilities as the only solution. The approach, capabilities, and requirements must provide everyone from the CISO to the System Administrator with the ability to id ...
Provided By: Pexip Oct 2021
Zero Trust is shaping the future of data security for government organizations. In this white paper, you'll learn what Zero Trust is, how it works, and why data-centric security matters. You'll also discover the role of data confidence, and why dynamic risk assessments will revolutionize everything we think we know about cybersecurity.
Provided By: Netscout Oct 2021
Applications that require a high level of security and guaranteed packet delivery are best served by a Layer 1 Matrix Switch. Many types of applications, from video distribution systems for command and control to large-scale cyber test ranges, require secure, high-performance packet delivery that a traditional networking infrastructure cannot provide. Learn more about three use cases for NETSCOUT's Matrix Switches and management software.
Provided By: Ntrepid Corp Oct 2021
Managed attribution (MA) is the process of controlling the technical and behavioral indicators that comprise your online identity (or attribution). By managing their attribution, operators, investigators, analysts, and researchers can construct an online identity that is consistent with their mission and may persist over time, allowing them to access social media platforms, dark web markets, and other online operational domains. This MA-enabled access allows users to pursue a variety of online missions without revealing their identity or organization. In short, effectiv ...
Provided By: Technical Systems Integrators Oct 2021
For companies that have or make use of production network infrastructures whether private or public, in the cloud or a hybrid, there is a need for developers, consumers of the infrastructure, and the administrators of the infrastructure to perform cyber training, testing, and exercises on a replica of their production infrastructure or Cyber Range. Delivering this Cyber Range as a Service (CRaaS) allows for the fastest and most economical way to for users to perform their required tasks. The myriad of services, applications, processes, methodologies, and tools such as t ...
Provided By: AFCEA Sep 2021
The U.S. Navy is moving ahead at full speed to equip its assets with e¬ective cybersecurity. However, the diverse nature of those assets, some are city-size ships while others are small but vital systems, confound planners seeking to ensure interoperable security measure.
Provided By: SolarWinds Sep 2021
Adopting a security by design approach is helping SolarWinds improve its security while also promoting supply chain security with its customers.
Provided By: AFCEA Sep 2021
Coast Guard Embarks on Cyber Offense. The service blends its traditional maritime roles with expanded digital strengths to thwart adversaries.
Provided By: Akima Aug 2021
The U.S. Air Force IT enterprise deals with a range of needs, from managing services such as help desk tickets to managing major initiatives such as cybersecurity and cloud migration programs. Governance, configuration management and a customer focus are the key components to its success. Learn more from Douglas Dudley, director of Air Force programs for Akima LLC.
Provided By: AFCEA Aug 2021
With assistance from the U.S. Army Cyber Center of Excellence and industry experts, TechNet Augusta 2021 is designed to open the lines of communication and facilitate networking, education and problem solving. This Solutions Review Compendium complements the event and helps builds engagement in advance.
Provided By: SteelCloud Aug 2021
Cybersecurity for computer networks and systems just keeps getting tougher every day. New attack vectors and threats occur by the hundreds on a daily basis. Protecting systems and data requires massive defensive vigilance and action on the part of CISOs, CTOs, CIOs and the personnel that work for them at multiple points in the value chain of serving up information systems services to a needy customer base. Cyber incursions are happening at scale, bad actors are behind them, and we have to eliminate or mitigate the risk. In government, compliance usually deals with a law ...
Provided By: Mission Cyber Jul 2021
Small businesses are beginning to feel the pressure of CMMC compliance. After numerous webinars and roundtable discussions on strategy and what-ifs, it's time to discuss tactics and how we get this done. Can the SMB DIB community help itself obtain compliance and strengthen cyber hygiene for its contractual government data, as well as protecting our own? Mission: Cyber believes it starts with a single CMMC control leveraging protective DNS.
Provided By: Netskope Jul 2021
The recent Executive Order on Improving the Nation's Cybersecurity details six key outcomes that the White House is trying to achieve. Join Netskope's Chief Evangelist, Bob Gilbert, in this on-demand session for a breakdown of the order, an overview of the driving factors behind the order's call to action, and a closer look at Netskope's approach to Zero Trust, its benefits, and how your agency can get started today.
Provided By: Unisys Jun 2021
The pandemic prompted a rush to the cloud. Fast action was critical given the rapidly expanded work-from-home requirements and the need for touchless procurement, sales and service. Now the initial rush has passed, and the dust is settling down. It's time to assess and address the compliance, cybersecurity, data privacy and risk implications of your cloud deployment. Cloud security and compliance continue to be the biggest pain points for cloud customers. If you think it's too late for that, think again. It's never too late to do things right. Doing things right is mor ...
Provided By: SpiderOak May 2021
President Bidens new cybersecurity requirements have been a ng time coming, and fit with trends we have observed and incorporated at SpiderOak. For example, the executive order will bring the government and its vendors closer to what is called zero trust, which refers both to the way computer systems are designed and how they are used. Previously, government agencies focused on malicious threats originating outside of their organizations, but were less rigorous in controlling and compartmentalizing data inside their perimeters. Hackers have exploited the vulnerability ...
Provided By: Netskope May 2021
As the Department of Defense migrates more mission-critical systems and software to cloud environments, it must also consider an innovative way for securing this new environment from potential cyber attack.
Provided By: Resecurity May 2021
Recent cyberattacks against critical infrastructure, such as the May 2020 attack on the Colonial Pipeline Company, have put a spotlight on cybersecurity vulnerabilities. Identifying and combating cyber adversaries require both human intelligence and a deep technical expertise, according to Gene Yoo, CEO of Resecurity Inc. To combat such threats, companies and government agencies need accurate intelligence, and that intelligence is as important as is information sharing between organizations. Learn more in this executive video.