Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Leveraging Software Emulation to Root Out Hackers
Provided By: ViaSat, Inc.   Send Email to POC   View Content   Jul 2021
Big data and automation tools help organizations fingerprint malicious online behavior.

Meeting DoD's Data Challenges with a Federated Data Strategy
Provided By: Microsoft Azure   Send Email to POC   View Content   Jul 2021
To maintain America's advantage over potential adversaries, the Department of Defense last year outlined a data strategy directing that military leaders must recognize that data is a strategic asset that must be operationalized in order to provide a lethal and effective Joint Force that, combined with our network of allies and partners, sustains American influence and advances shared security and prosperity.

Assured Cross-Domain Access Through Hardware-Based Security
Provided By: Garrison   Send Email to POC   View Content   Jul 2021
Connectivity is at the heart of today's modern military operations. To conduct complex, distributed multidomain operations at speed and scale, U.S. and allied forces need seamless connectivity to enable real-time communications and high-fidelity data flows

The Zero Trust Approach To Information Security For The Mobile Workforce
Provided By: Yubico   Send Email to POC   View Content   Jul 2021
Modern Authentication Can Secure DoD Information for Excellence in Mission Execution.

Achieving Decision Dominance by Empowering the Tactical Edge
Provided By: Red Hat   Send Email to POC   View Content   Jul 2021
Decision dominance is the ability for a commander to sense, understand, decide, act and assess faster and more effectively than any adversary, Army Futures Command Commander Gen. John Mike Murray, USA, told the Association of the U.S. Army Global Force Next virtual conference in March.

Achieving the Army's Data Imperatives at the Tactical Edge
Provided By: Elastic   Send Email to POC   View Content   Jul 2021
By design, the DoD Data Strategy compels transformational change in the way data is collected, analyzed and leveraged. The mechanics may be different depending on domain or joint all-domain mission, but as referenced in a previous SIGNAL special interest editorial, the strategy's endgame is to ensure that trusted information gets to the right destination at the right time.

Why It's Time To Replace Your VPN
Provided By: Appgate   Send Email to POC   View Content   Jul 2021
Today's distributed, hybrid and agile IT estates have illuminated the VPNs security and complexity flaws - it's time for a better approach to remote network access. Remote work, remote access and network topologies look drastically different today than just 2 years ago, let alone 25 years ago when the VPN was born. The VPN architecture has remained fundamentally unchanged and was designed for a perimeter-centric model that operated under the premise of - trust, then verify. The inherent security flaws and complexities introduced by VPNs introduce risk and slow down digi ...

An Assume-Breach Mindset: 4 Steps To Protect What Attackers Are Really After
Provided By: Merlin Cyber   Send Email to POC   View Content   Jul 2021
It's time to adopt an "assume-breach" mindset to detect and isolate adversaries before they traverse your network and inflict serious damage. An assume-breach mindset means thinking like an attacker. If, like us, you spend a lot of time helping organizations prevent and respond to attacks and breaches, you get to know a lot about how attackers think. So in this guide, we're using what we've learned to help you protect your organization against the most common attack paths attempting to compromise your most critical assets.

Channeling the Urgency of the Battlefield to Command & Control Testing
Provided By: Keysight Technologies   Send Email to POC   View Content   Jul 2021
The DoD's Software Acquisition Pathway makes it clear: test automation is central to command and control. Read our eBook to discover how the U.S. Army automates testing of thousands of conditions ensuring safer, more reliable software for joint warfighters.

On-Demand Webinar: Parsing The White House Executive Order
Provided By: Netskope   Send Email to POC   View Content   Jul 2021
The recent Executive Order on Improving the Nation's Cybersecurity details six key outcomes that the White House is trying to achieve. Join Netskope's Chief Evangelist, Bob Gilbert, in this on-demand session for a breakdown of the order, an overview of the driving factors behind the order's call to action, and a closer look at Netskope's approach to Zero Trust, its benefits, and how your agency can get started today.

Transforming the Workplace of Today, Tomorrow, and Beyond
Provided By: Crestron   Send Email to POC   View Content   Jul 2021
The place workers call the office and the way they work and collaborate has forever changed. Today, workers are scattered between offices, homes, and other remote locations. At Crestron, we are proud to chart the path forward as we explore the future of work and solutions that strengthen our connections with people, anywhere they may be.

It's Time to Ditch the VPN for Zero Trust
Provided By: Tanium   Send Email to POC   View Content   Jul 2021
Zero trust has completely changed the conversation around network security. Learn how Tanium and its partners' capabilities contribute to a zero trust solution and what you need to know about adopting zero trust in your organization.

How SaaS Data Protection is Reshaping Federal Agencies
Provided By: Commvault   Send Email to POC   View Content   Jul 2021
For today's federal agencies who are looking to modernize their own in-house technologies, cloud adoption may be central driving force. It represents opportunities to breed new efficiencies, shed legacy tech debt, and rapidly innovate operations. And while adopting cloud-based technologies was historically an onerous and painstaking process, the Federal Risk and Authorization Management Program (FedRAMP) removes common hurdles associated with evaluating and consuming cloud-based solutions. Through FedRAMP, federal agencies can rapidly (and confidently) adopt cloud techn ...

FedRAMP High Data Protection from Metallic
Provided By: Commvault   Send Email to POC   View Content   Jun 2021
Metallic, from Commvault, delivers enterprise-grade SaaS data protection without the complexity. With broad-ranging coverage across apps, endpoints, and hybrid cloud environments, Metallic currently offers the only data protection portfolio capable of meeting stringent FedRAMP High security protocols required by today's federal agencies. This brief details the only FedRAMP High data protection solution currently available.

3DTDOA Wide Area Passive Aircraft Geolocation
Provided By: CRFS   Send Email to POC   View Content   Jun 2021
Time Difference of Arrival (TDOA) techniques use differences in the travel time of RF signals to pinpoint their location of origin. 3D TDOA allows signals' altitude, as well their latitude and longitude, to be calculated. In this White Paper, we discuss the basic operating principles of 3D TDOA, explore some practical limitations on its accuracy, examine some applications of the technique, and see an example of it being used in practice.

Ensure Your C2 Technology is Ready for Modern Warfare
Provided By: Keysight Technologies   Send Email to POC   View Content   Jun 2021
Learn how AI-driven test automation can help you securely test mission-critical software components.

Moving Defense Technology from compliance to Excellence
Provided By: Keysight Technologies   Send Email to POC   View Content   Jun 2021
The Pentagon has initiated a shift towards DevSecOps for all its software. Learn how test automation helps to meet requirements and deliver excellence.

You Rushed to the Cloud - Now It's Time to Assess and Address Cloud Security
Provided By: Unisys   Send Email to POC   View Content   Jun 2021
The pandemic prompted a rush to the cloud. Fast action was critical given the rapidly expanded work-from-home requirements and the need for touchless procurement, sales and service. Now the initial rush has passed, and the dust is settling down. It's time to assess and address the compliance, cybersecurity, data privacy and risk implications of your cloud deployment. Cloud security and compliance continue to be the biggest pain points for cloud customers. If you think it's too late for that, think again. It's never too late to do things right. Doing things right is mor ...

Don't Take Cloud Security for Granted
Provided By: Unisys   Send Email to POC   View Content   Jun 2021
The cloud journey is exciting. Done right, it can bring many benefits to your company. If you don't do it right, however, the cloud can create significant nightmares. So, put the appropriate focus on cloud security, and not just on the cloud journey. Know that breaches will occur. And be ready to remediate and isolate breaches within seconds or minutes to limit the attack surface.

Information Destruction 101
Provided By: Security Engineered Machinery   Send Email to POC   View Content   Jun 2021
SEM's Information Destruction 101 breaks down the NSA standards for data destruction by classification, material, use case, and volume. Includes best practices for data destruction as well as discussion on the challenges surrounding enterprise drive destruction, the recent DVD/BD requirement, and implementation of the ISOO CUI mandate. Also includes information on zero landfill solutions for centralized paper destruction that comply with agency greening standards and contribute toward LEED certification.