Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...


How a Government Defense Ministry used Coordinated Cyber Training to Counter Imminent Threats, Develop Operator Skills
Provided By: Circadence   Send Email to POC   View Content   Mar 2021
Cyber security experts estimate that 90% of cyber-attacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to DOD's Principal Cyber Advisor.

To Embrace Mobile, Agencies Need Control
Provided By: CIS Mobile   Send Email to POC   View Content   Mar 2021
When it comes to insider threats, defense and intelligence agencies shouldn't worry so much about the next Edward Snowden. The biggest internal attack vector is the spy in your pocket.

Circadence Webinar - Transitions to Cloud
Provided By: Circadence   Send Email to POC   View Content   Mar 2021
As state and local governments shift operations to the cloud, it is more important than ever to stay on the front lines of cyber defense as cyber pros figure out how to secure cloud-based applications being used by employees. Learn why government agencies are adopting cloud computing and what security challenges governments face when shifting to the cloud. You'll learn why cloud-based training is the future of cyber learning for government security professionals and how the cloud shift will impact cybersecurity in the government sector.

China, Cyberspace and Hybrid State Power
Provided By: AFCEA   Send Email to POC   View Content   Feb 2021
The rise of China as a peer competitor vying for superpower status has emerged as an important challenge for the United States. The AFCEA Cyber Committee opens the discussion of China's hybrid approach to the use of power, particularly in cyberspace, as a competitor to the United States. Internal and external governance and to its application on the battlefield are two facets of China's approach.

Application Load Balancing Key Considerations for Federal Agencies
Provided By: Kemp Technologies   Send Email to POC   View Content   Feb 2021
There are several key issues to consider when comparing top load balancer manufacturers for federal government use and ownership strategy that can significantly impact Total Cost of Ownership and Return on Investment. Load balancers enable the security, availability and performance of network-based applications by providing a number of services and functions. Check out this whitepaper and see what are the most important factors when choosing the right solution for your environment.

Security in the Cloud Requires Zero Trust Architecture
Provided By: McAfee   Send Email to POC   View Content   Feb 2021
To deal with the pandemic lockdown this year, the Department of Defense had to massively and immediately ramp up remote teleworking capacity across its global network, meaning the department also had to move to implement a Zero Trust architecture- a security system where there is no such thing as a trusted source.

Mapping Humanity with Machine Learning
Provided By: Fraym   Send Email to POC   View Content   Feb 2021
Ben Leo, CEO & Co-Founder of Fraym, speaks with the Editor & Chief of Signal Magazine about the mega trends driving the geospatial analytics market including pandemic preparedness, response, and disease, global power competition, inequity and insecurity, and climate impact and vulnerability. Fraym uses machine-learning models to generate hyper-local insights on communities around the globe. The company's location-based data about population characteristics and behaviors is employed by governments and organizations tackling some of the world's most pressing challenges.

Achieving Spectrum Dominance by Defeating the EW Kill Chain
Provided By: TrellisWare   Send Email to POC   View Content   Feb 2021
For almost half a century, U.S. military superiority has rested on its ability to operate freely in the electromagnetic spectrum. But something has changed.

Merging Security Layers Aid DOD Cloud Security
Provided By: ViaSat, Inc.   Send Email to POC   View Content   Feb 2021
As the U.S. government migrates to cloud-centric networks, the need to protect them from rapidly evolving cyber threats increases. This shifting environment presents Defense Department planners with security challenges. Securing information across military enterprise domains is a daunting consideration, especially when sensitive and classified data must move between different security layers in the network.

The Cyber Edge January 2021
Provided By: AFCEA   Send Email to POC   View Content   Feb 2021
When the GAO performs cybersecurity-related audits and reports its findings, the watchdog provides key recommendations to agencies to improve their networks and information technology from risks. The GAO also follows up to see how an agency implemented those recommendations.

Getting Left of Boom: How to Defeat Ransomware and Other Cyber Threats
Provided By: TrustWave   Send Email to POC   View Content   Jan 2021
There is a virulent plague spreading across the globe, Homeland Security Secretary Alejandro Mayorkas warned earlier this year. But he wasn't talking about COVID-19. Instead, he was referring to what he called "an epidemic that is spreading through cyberspace: ransomware."

Cybersecurity Embraces the New Normal
Provided By: RSA   Send Email to POC   View Content   Jan 2021
The COVID-19 pandemic has forced federal agencies and private businesses around the world to adapt to a new reality, one where most of their employees now work remotely and communicate virtually. This "new normal" imposes changes on how organizations protect and manage their networks, making chief information officers (CIOs) and chief information security officers (CISOs) adapt procedures to operate in this new reality.

Certainty in an Uncertain Age
Provided By: Regions Bank   Send Email to POC   View Content   Jan 2021
We live in perilous times. The COVID-19 pandemic has precipitated an unprecedented international economic contraction. In particular, the defense sector faces an uncertain future. The pandemic is threatening to change the way Americans think about security and raise questions about U.S. defense spending.

TSM Waveform Advantageous for Subterranean Communications
Provided By: TrellisWare   Send Email to POC   View Content   Jan 2021
The subterranean environment introduces special challenges for tactical communications that would otherwise be avoidable in other operational environments. The TrellisWare TSM Mobile Ad-hoc Networking (MANET) waveform (TSM) provides a highly scalable and robust MANET solution in real dynamic environments. TSM is infrastructure-less, self-forming, and self-healing to support uninterrupted communications in harsh RF topologies where other networks typically fail.

Strengthening the Nation's Cybersecurity Strategy, Part Two
Provided By: AFCEA   Send Email to POC   View Content   Jan 2021
The AFCEA Cyber Committee is pleased to present the second in a series of white papers designed to inform an evolving national cybersecurity strategy. While many cybersecurity recommendations focus on federal government activities, including civilian
 and military components, the committee recognizes the vital role that state and local authorities and stakeholders must play to safeguard the nation's civil, critical and business infrastructures. A one-size-fits-all model doesn't exist because local government organizations vary in size and complexity, cyber capability an ...

AFCEA TechNet Augusta Solutions Showcase
Provided By: AFCEA   Send Email to POC   View Content   Jan 2021
AFCEA International is hosting TechNet Augusta in an exciting and diverse format. The conference's series of information-sharing events began with the Army's request for industry capabilities proposals to some of its most difficult problems. Members of the association's Technical Committee reviewed more than 60 potential solutions. This document features these solutions, which have been made available to the Army's leaders, program managers and technologists

U.S. Air Force Expedites Mission Capabilities Leveraging ML
Provided By: TAMR   Send Email to POC   View Content   Jan 2021
The United States SEEK EAGLE Office (AFSEO) is the center of excellence responsible for managing the aircraft store compatibility process. Get an insider's look at how AFSEO leveraged ML to accelerate time to insights by automating entity resolution, record duplication, and categorization. Learn how the office is able to increase ROI and utilization of Air Force aircraft.

Achieving Multidomain Operations through Virtualization
Provided By: Trace   Send Email to POC   View Content   Jan 2021
The U.S. Department of Defense is returning to a command-and-control concept embracing joint and allied operations with the added domains of space and cyberspace adding to the mission space. But while this reorientation appears to revisit older Cold War-era strategies on the surface, it is the end result of careful analysis by the Pentagon to make up for operational deficiencies and neglected capabilities from two decades of counterinsurgency-oriented warfare.

5 Ways AI, IoT, and security are shaping the API economy
Provided By: Mulesoft   Send Email to POC   View Content   Dec 2020
Artificial intelligence (AI), the internet of things (IoT), and security technologies are set to disrupt every industry in the next decade. To get there, leading organizations like McDonald's, Uber Eats, and HSBC have built adaptable digital platforms via APIs. In the ebook, MuleSoft founder Ross Mason shares his point of view on how to build a thoughtful API strategy that will help your organization take full advantage of emerging technologies like AI, chatbots, and IoT without compromising on security.

Certainty in an Uncertain Age
Provided By: Regions Bank   Send Email to POC   View Content   Dec 2020
The COVID-19 pandemic has precipitated an unprecedented international economic contraction. Many companies will face challenges. One factor that will distinguish the winners from the losers is the financial flexibility to seize M&A opportunities; invest in new, profitable lines of business; and keep teams with valuable and hard-to-replicate skillsets together through tough times. Even more critical is the ability to have a diversified business that is resilient enough to weather any storm. A business with a well-diversified customer base and product offering is likely t ...