Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Bodil Lund by phone (703) 631-6181 or email or your SIGNAL account executive.

Filter the library by ...

   

Use a Matrix Switch to Launch Mission-Critical Solutions with Confidence
Provided By: NETSCOUT   Send Email to POC   View Content   Jan 2022
Provide ultra-secure connectivity for mission critical military applications. Applications that require a high level of security and guaranteed delivery are best served by a matrix switch. Many types of applications, from video distribution systems for command and control to large-scale cyber test ranges, require secure, high-performance connectivity that a traditional networking infrastructure cannot provide. Learn more about three use cases for NETSCOUT's matrix switches and management software.

Technology Brief: Meeting the US Presidential Executive Order for Zero Trust
Provided By: archTIS   Send Email to POC   View Content   Dec 2021
The new U.S. Presidential Cybersecurity Executive Order for Zero Trust requires US Federal agencies to transition to a Zero Trust Architecture (ZTA). These new ZTA recommendations still do not effectively address the data security challenges. In this new Technology Brief we discuss the ramifications of this executive order and how to extend zero trust to the data itself. Read the Technology Brief to learn: How traditional zero trust architecture addresses network and application security, not the data that sits behind them. How this zero trust 'blindspot' leaves agencie ...

Jumpstarting Rural Broadband Initiatives
Provided By: AFCEA   Send Email to POC   View Content   Dec 2021
High-speed Internet access is critical to economic opportunity, job creation, education and civic engagement. All Americans, whether living and working in cities or the nation's rural areas, need reliable and ready access. This white paper, prepared by members of AFCEA's Cyber Committee, reviews some of the major government programs to improve nationwide availability of broadband and offers suggestions for how and why the private sector should participate. It also investigates the security and national competitive implications of the lack of reliable broadband Internet ...

Work From Home - Work Remote for Labs
Provided By: Technical Systems Integrators   Send Email to POC   View Content   Dec 2021
The Engineering Community faces numerous challenges from the pandemic that has brought onsite workplace tasks on physical infrastructure to a halt. Engineers that could normally be counted on to setup, configure, and consume physical infrastructure for a variety of use cases from DevOps/DevSecOps to production test have been severely impacted due to Pandemic constraints of working from home or remote locations. The workflow velocity around these use cases has been limited due to the lack of remote control and automation for these tasks. A new level of remote control and ...

JADC2: Tactical Edge Networking to Win in Great Power Competition
Provided By: Fuse Integration   Send Email to POC   View Content   Dec 2021
As the U.S. military faces an increasingly complex and dynamic strategic landscape, it must be able to communicate and act across all domains and the range of military environments to maintain a competitive advantage in the global theater. Warfighters across the joint force must be able to securely communicate with each other and with command centers without having to stop and consider interoperability limitations. Collaborating to harness advancements in network, software and technology systems, the DoD and industry partners will design innovative solutions that enable ...

Applying Zero Trust Architecture for Secure Video Conferencing
Provided By: Pexip   Send Email to POC   View Content   Dec 2021
As more federal agencies rely on remote work and video conferencing, zero trust techniques can help ensure security and smooth transitions between classification levels.

Cloud File Data Services for the Federal Government
Provided By: Qumulo   Send Email to POC   View Content   Dec 2021
Qumulo's file data platform on AWS GovCloud empowers Federal and private sector organizations with the flexibility to run at massive scale across on-prem, hybrid, and multi- cloud environments. With Qumulo's multiple file access protocols you can run the same applications without rewriting them, whether your data is in the cloud, on prem, or distributed across both.

Paying The Price For Ergonomics
Provided By: Winsted   Send Email to POC   View Content   Nov 2021
The many benefits of good ergonomics in the control room translate to significant ROI regarding healthcare costs, increased productivity and reduced operator error. Looking beyond the numbers, ergonomics is an investment in your employees. Operators who are comfortable in their jobs will display efficient performance. An ergonomic program is just good business from the overall health of your employees, to the financial health of your organization.

Building Dynamic Information Barriers in Microsoft 365 and Teams
Provided By: archTIS   Send Email to POC   View Content   Nov 2021
Building Dynamic Information Barriers in Microsoft 365 and Teams This white paper examines the challenge of building information barriers in Microsoft 365 applications including SharePoint and Teams using role based security and how to create more usable separation for more complex defense and multinational use cases using dynamic attribute-based access control (ABAC) policies.

Centralizing Data for Mission-Critical Intelligence
Provided By: Mark Logic   Send Email to POC   View Content   Nov 2021
New types of architectures like Smart Data Fabrics help agencies make better use of the data they gather by breaking down silos and using smart tools to structure the information.

Testing Wi-Fi for High-Performance Use Cases
Provided By: Spirent   Send Email to POC   View Content   Nov 2021
High-performance use cases such as Work From Home, industrial IoT, telehealth and 4K streaming video are driving adoption of a new generation of Wi-Fi connectivity. These use cases come with high expectations even as the complexity of Wi-Fi networks and the interoperability challenges surge. How can service providers and vendors ensure Wi-Fi 6/6E and beyond deliver the performance their customers demand? They must thoroughly test new Wi-Fi products and services in controlled, repeatable conditions that mimic the real-world. Created by Spirent's team of Wi-Fi experts, th ...

Zero Trust Architectures and the Tactical Domain: A Round Peg in a Square Hole?
Provided By: Redcom   Send Email to POC   View Content   Nov 2021
The Zero Trust Architecture (ZTA) has rapidly become the hottest topic in cybersecurity. However, REDCOM has noticed that today's discussions inevitably focus on ZTA from the standpoint of the enterprise, ignoring the nuances and pitfalls of implementing ZTA in the tactical domain. Instead of driving the ZTA solely from the top-down, REDCOM is seeing an operational benefit in constructing the enterprise ZTA from the bottom-up. This paper will delve into the potential issues with the industry's current approach and introduce our solution, REDCOM ZKX. ZKX changes the secu ...

How 5G Is Changing the Game for Government Core and Edge Networks
Provided By: Spirent   Send Email to POC   View Content   Nov 2021
5G wireless technology offers the potential for virtual and augmented reality supported capabilities for warfighters and even more capable robotic and remote operated platforms, but technical and security challenges must me met before it can enter widespread service.

Executive Order on Improving
Provided By: Tanium   Send Email to POC   View Content   Nov 2021
On May 12, 2021, President Biden signed an Executive Order (EO) to improve the nation's cybersecurity and protect federal government networks. True improvement necessitates the adoption of modern approaches and practices, with the most critical element being enterprise wide, real-time visibility and control. As proven by numerous recent cyber events, federal agencies cannot rely on prevention and detection capabilities as the only solution. The approach, capabilities, and requirements must provide everyone from the CISO to the System Administrator with the ability to id ...

Optimizing Your Zero Trust Environment for Secure Video Conferencing
Provided By: Pexip   Send Email to POC   View Content   Oct 2021
Zero Trust is shaping the future of data security for government organizations. In this white paper, you'll learn what Zero Trust is, how it works, and why data-centric security matters. You'll also discover the role of data confidence, and why dynamic risk assessments will revolutionize everything we think we know about cybersecurity.

Layer 1 Matrix Switches provide ultra-secure, ultra-scalable, any-to-any connectivity for mission-critical Military Applications
Provided By: NETSCOUT   Send Email to POC   View Content   Oct 2021
Applications that require a high level of security and guaranteed packet delivery are best served by a Layer 1 Matrix Switch. Many types of applications, from video distribution systems for command and control to large-scale cyber test ranges, require secure, high-performance packet delivery that a traditional networking infrastructure cannot provide. Learn more about three use cases for NETSCOUT's Matrix Switches and management software.

Managed Attribution: A Foundation for Effective Online Operations
Provided By: Ntrepid Corp   Send Email to POC   View Content   Oct 2021
Managed attribution (MA) is the process of controlling the technical and behavioral indicators that comprise your online identity (or attribution). By managing their attribution, operators, investigators, analysts, and researchers can construct an online identity that is consistent with their mission and may persist over time, allowing them to access social media platforms, dark web markets, and other online operational domains. This MA-enabled access allows users to pursue a variety of online missions without revealing their identity or organization. In short, effectiv ...

Cyber Range as a Service
Provided By: Technical Systems Integrators   Send Email to POC   View Content   Oct 2021
For companies that have or make use of production network infrastructures whether private or public, in the cloud or a hybrid, there is a need for developers, consumers of the infrastructure, and the administrators of the infrastructure to perform cyber training, testing, and exercises on a replica of their production infrastructure or Cyber Range. Delivering this Cyber Range as a Service (CRaaS) allows for the fastest and most economical way to for users to perform their required tasks. The myriad of services, applications, processes, methodologies, and tools such as t ...

Information Advantage Landscape
Provided By: Deloitte   Send Email to POC   View Content   Oct 2021
Multi-domain operations present the DOD with several challenges, such as dealing with biased data, using that information more effectively and cutting the data collection to decision loop.

The Cyber Edge July 2021
Provided By: AFCEA   Send Email to POC   View Content   Sep 2021
The U.S. Navy is moving ahead at full speed to equip its assets with e┬Čective cybersecurity. However, the diverse nature of those assets, some are city-size ships while others are small but vital systems, confound planners seeking to ensure interoperable security measure.