Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

FlexGround High-speed Broadband for Remote Government Operations
Author: Intelsat General   Send Email to POC   View Content
Rapid-response government ground forces are increasingly deployed in areas far from any kind of communications infrastructure yet require broadband connectivity for Comms-on-the-move and Manpack applications. This white paper describes Use Cases for military and disaster-recovery teams and how FlexGround from Intelsat General addresses these teams' challenges with secure, always-on broadband connectivity for voice, data and high-definition full-motion video.

Open Source Software and Mission-Critical Applications: A Cautionary Tale
Author: AFCEA   Send Email to POC   View Content
AFCEA International Cyber Committee The efficiencies of using and embedding open source software imply a number of risks. AFCEA Cyber Committee members have examined the origins of the OSS trend, its motivation and some of these risks and drawn an analogy to previous quality control experiences. Members offer suggestions for mitigating the risks when building systems they intend to trust.

Deception-Based Threat Detection
Author: Attivo Networks   Send Email to POC   View Content
This book provides a general introduction to deception technology and an overview of use cases from general detection to creating an active defense. You will gain a better understanding of how deception fits within your overall security architecture and the role it plays in detecting, identifying, and responding to threats

Small Business Cybersecurity
Author: AFCEA   Send Email to POC   View Content
AFCEA International Small Business Committee and Cyber Committee Rapid technology changes create new security vulnerabilities that require small businesses to expend resources to remain compliant. The fundamental problem is twofold: increasing technology complexity and competition for training security professionals. Members of the Small Business and Cyber committees suggest best practices, recommendations and information resources for small businesses to address these issues

In Data Intelligence Too, Speed is Life
Author: Fenix Group   Send Email to POC   View Content
Discussion points on the need for policy reform in edge data networking & sensor intelligence. This white paper offers a model for increasing cost efficiencies to keep up with near peer threats, and a focus on speed of data intelligence delivery to front line troops across all service branches.

The Who, What, Why and How of DDoS Attacks: A Guide for IT Pros
Author: AFCEA   Send Email to POC   View Content
The IT industry has seen a major increase of Distributed Denial of Service (DDoS) attacks over the past several years. The December 2019 New Orleans cyberattack is such an example: This attack combined a classic ransomware deployment with a DDoS attack. The DDoS upward trend promises to continue. DDoS attacks date back to the dawn of the public internet, but the force is strong with this one. According to a 2018 report from International Data Group (IDG), the median downtime caused by a DDoS attack is 7 to 12 hours. Using an estimate from Gartner of $5,600 per minute of ...

Summer 2020 Technology Vectors Update by the AFCEA Technology Committee
Author: AFCEA   Send Email to POC   View Content
An annual presentation on current technology trends provided by the AFCEA International volunteer Technology Committee. Provides insights and expertise in emerging technology topics most relevant to Federal technology leaders.

LED Video Wall Technology Choices
Author: Daktronics   Send Email to POC   View Content
Price is an important deciding factor, but many other quality and performance factors can affect the overall cost and effort to operating and maintaining a digital video wall. To consider the bigger picture, let us examine the key differences between LCD, direct-view LED and DLP technologies in the areas of image quality, ease of service/installation and lifetime performance

Your Guide to Building a CSfC Approved Solution
Author: Attila Security   Send Email to POC   View Content
For decades, Type 1 has been the NSA's most prized cybersecurity designation. Recent years, however, have seen the growth of NSA's Commercial Solutions for Classified (CSfC) program, which offers an alternative to Type 1 products. This guide is designed to help individuals looking to build a CSfC approved solution and provides guidance on how to use the resources available, navigate the CSfC process, and what to expect from CSfC component vendors.

Mission Assured Data Protection White Paper
Author: Veeam   Send Email to POC   View Content
Discover challenges the DoD faces in trying to address its backup problems, how to improve the backup processes, the ability to verify backups, the simplicity of using Veeam and why a backup solution needs to be effective in a highly heterogeneous environment.

The Cyber Edge April 2020
Author: AFCEA   Send Email to POC   View Content
Daily cyber attacks and other threats naturally take up the short-term attention of many governmental agencies, but there is a need for a more strategic look at risks to the nation's critical infrastructure.

Integrating Deception with DevOps
Author: Attivo Networks   Send Email to POC   View Content
Organizations can deploy deception across the DevOps cycle to get insights into attacker activity and alert on any misconfigurations. Learn more about how Deception complements existing DevSecOps security controls in this white paper.

DESIGNING LOGISTICS INFORMATION SYSTEMS for Global Military Operations
Author: STS International, Inc   Send Email to POC   View Content
The United States (US) Government employs a variety of force protection and intelligence, surveillance, and reconnaissance (ISR) systems around the world. These systems detect and defend against threats to US service members and allied forces. The vital function of these systems protecting US soldiers and allies requires the equipment to be operational at all times, accomplished through responsive and agile logistics operations.A critical tool of successful logistics operations is the Logistics Information System (LIS). An LIS is a database used to effectively collect, ...

Securing the Enterprise when employees work remotely
Author: Attivo Networks   Send Email to POC   View Content
For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportunity for cybercriminals and reduces their time to compromise. While it is impossible to prevent every possible attack, proper planning and use of deception technologies could detect and prevent lateral movement and avert a more significant impact on the organization. To learn more, check out this solution brief on securing the enterprise while employees work remotely.

Fundamentals of Mobile Device Security
Author: Bittium   Send Email to POC   View Content
What are the most relevant aspects that must be taken into account in mobile device security? In this White Paper we will dive into fundamentals of mobile device security from main perspectives, and answer to questions such as: What are we fighting against? What are we protecting? We tell about the techniques that mitigate the threats and reveal the main points organization has to address to protect own and customers' data.

Taking the Risk out of Software Supply Chain Management
Author: Flexera   Send Email to POC   View Content
Supply chain management is vitally important to running and maintaining an organization's IT systems. When it is carried out, in many federal agencies it's traditionally a manual process managed on spreadsheets. In recent years new directives have mandated that the Department of Defense (DOD) and civilian agencies must all begin monitoring this, especially for cybersecurity considerations within the Department's Risk Management Framework (RMF). In this editorial, Flexera Software explains how many department directors are paying more attention to life-cycle management f ...

NIST: 800-160 (2) AND 800-171 (B) SECURING HIGH VALUE ASSETS AND CONFIDENTIAL UNCLASSIFIED INFORMATION
Author: Attivo Networks   Send Email to POC   View Content
The NIST publications 800-160 Volume 21 and 800-1712 deal with developing cyber-resilient systems and protecting controlled unclassified information in nonfederal systems and organizations, respectively. These documents give an organization clear guidance on implementing secure systems from the policy, process, personnel, and technical perspectives. This paper will very briefly summarize these NIST publications, introduce deception technology, and show how deception technology fits within the NIST guidelines to support regulatory compliance and enhanced security.

Monitoring Interference in the 2.4 GHz ISM Band with a Real-Time Spectrum Analyzer
Author: Anritsu, Inc.   Send Email to POC   View Content
This paper highlights the power of an RTSA spectrum analyzer for detailed analysis of crowded areas of spectrum. The Field Master Pro MS2090A RTSA has a probability of intercept (POI) of 2.055 μs, meaning it is certain to capture the shortest of packets seen in the ISM bands. The spectrogram feature provides a view over time of spectral activity and a user settable persistence mode enables identification signal in signal interferers.

Practical Uses for a Real-Time Spectrum Analyzer in 5G, LTE, and Wi-Fi Spectrum Monitoring
Author: Anritsu, Inc.   Send Email to POC   View Content
Limitations in conventional spectrum analyzers are found in two key areas: signal power density and visualization of fast digital signals. This is where the strength of a real-time spectrum analyzer (RTSA) becomes apparent.

For fast changing signals, complex modulations, and the highly variable RF transmissions of the future, the new standard in spectrum measurement is the real-time spectrum analyzer. The Anritsu Field Master ProTM MS2090A solution is the highest performance portable RTSA available.

Understanding Key Real-Time Spectrum Analyzer Specifications
Author: Anritsu, Inc.   Send Email to POC   View Content
Advances in technology and design have enabled the creation of the first high performance real-time handheld spectrum analyzer with a 110 MHz analysis bandwidth and a 100% probability of intercept duration of 2.06 μs. Together with the variable persistence density display and spectrogram, the Anritsu Field Master Pro MS2090A spectrum analyzer is well suited to meet challenges in analyzing dynamic RF signal events and detecting transient interferers, and unwanted hidden signals.