Resource Library:

AFCEA's trusted Resource Library offers a wide range of white papers, e-books, case studies, executive videos and analytical content. These documents may be relevant to your work and of interest to you as a member of the global cyber, defense, security, intelligence and technology communities. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact our advertising department by phone (703) 631-6181 or email or your SIGNAL account executive.

Filter the library by ...

   

A Cyber Curriculum for a Digital Workforce
Provided By: AFCEA   Send Email to POC   View Content   Sep 2023
Cyber is increasingly important in today's digital world. The need for skilled cyber professionals who can protect our digital infrastructure and data from cyber threats has never been greater. However, the demand for professionals far outstrips the supply, and there is a growing skills gap in the cybersecurity workforce. In this white paper written by members of AFCEA International's Cyber Committee, readers get a sample cybersecurity curriculum designed to cover a range of topics and provide students with a comprehensive understanding of cybersecurity.

Coming of Age for OSINT
Provided By: Janes   Send Email to POC   View Content   Aug 2023
For the intelligence community (IC) to remain relevant in the information age, it must continue to embrace technological advancements, particularly those in artificial intelligence (AI) and machine learning (ML), in order to triage, wrangle, filter, and manage the vast and ever-increasing amounts of available data, without which the analyst would be overwhelmed.

2023 CrowdStrike Global Threat Report
Provided By: CrowdStrike   Send Email to POC   View Content   Aug 2023
2022 was a year of explosive, adaptive and damaging threats. Adversaries continue to be relentless in their attacks as they become faster and more sophisticated. CrowdStrike's 2023 Global Threat Report uncovers notable themes, trends and events across the cyber threat landscape.

Six Ways to Simplify Your Hybrid Cloud Journey
Provided By: Hitachi Vantara Federal   Send Email to POC   View Content   Aug 2023
As organizations increasingly seek to harness the benefits of both on-premises infrastructure and cloud services, the hybrid cloud model has emerged as a strategic imperative. Download this paper for a clear and actionable roadmap, outlining six key strategies that streamline the complex process of hybrid cloud integration, addressing challenges related to architecture, security, data management, and operational efficiency. Whether you are an IT leader, cloud architect, or a professional tasked with navigating your organization's cloud strategy, this paper equips you wi ...

Turn Data Into Accelerated Insights and Mission Results With DataOps
Provided By: Hitachi Vantara Federal   Send Email to POC   View Content   Aug 2023
In today's data-driven world, organizations face immense challenges in effectively harnessing the vast amount of data at their disposal to drive actionable insights and achieve mission-critical outcomes. Traditional data management approaches often prove inadequate in handling the velocity, volume, and variety of data generated across diverse sources. To address these complexities, DataOps, an emerging methodology, has gained significant attention as a transformative solution. Read this issue brief to explore specific use cases and to learn how DataOps can enable your o ...

Solve the Six Biggest Data Storage Challenges
Provided By: Hitachi Vantara Federal   Send Email to POC   View Content   Aug 2023
Can your IT infrastructure team keep up with the demands of a distributed workforce and data hungry applications? If you are overwhelmed by maintenance tasks and struggling to deliver IT projects fast enough, because you're continually challenged to be agile and "do more with less," it's time to rethink how you manage data storage. This eBook reviews how you can maximize your data infrastructure advantage to get performance and agility that scales by solving six data storage management challenges.

Next-Generation Cyber: Maximizing Threat Intelligence and Driving Organizational Resiliency
Provided By: AFCEA   Send Email to POC   View Content   Aug 2023
As our dependence on technology continues to grow, so does the vulnerability to cyber threats. The threat landscape is rapidly evolving, and it is essential for organizations to adopt measures to mitigate the impact of cyberattacks. Cyber resiliency refers to the ability of an organization to continue operating in the face of cyber incidents. It is a critical aspect of any cybersecurity strategy and involves a combination of preventive and reactive measures. AFCEA's Cyber Committee presents this whitepaper that discusses the key components of next-generation cyber, cybe ...

Skydio X2D: AI-powered Autonomous Drone for Organic, Unit-level ISR
Provided By: Skydio   Send Email to POC   View Content   Aug 2023
Skydio autonomous drone solutions are best-suited for sUAS use cases in the Defense customer segment. Skydio X2D can help bridge current military gaps and further improve the warfighter's capabilities. Our X2D system delivers a trustworthy NDAA-compliant solution designed and manufactured in the USA, and built to exceed the requirements of the U.S. Army Short Range Reconnaissance (SRR) program of record, making it the ultimate solution for military and defense to perform reconnaissance, search and rescue, and security patrol missions.

Edge Technologies for a Decisive Advantage
Provided By: Cubic   Send Email to POC   View Content   Aug 2023
DTECH Edge Compute and Networking platforms from Cubic Defense enable edge users to connect, secure, and analyze mission-critical data with trusted, scalable and intuitive edge technologies for a decisive advantage.

Threat Insights Report
Provided By: Poly   Send Email to POC   View Content   Aug 2023
Each quarter our security experts highlight notable malware campaigns, trends and techniques identified by HP Wolf Security. By isolating threats that have evaded
detection tools and made it to endpoints, HP Wolf Security gives an insight into the latest techniques cybercriminals use, equipping security teams with the knowledge to combat emerging threats and improve their security postures.

5G: Building the Environment for JADC2 Success
Provided By: Nokia   Send Email to POC   View Content   Aug 2023
The government is designing policies to support and complement its strengths, innovating and investing in network technologies from commercial vendors that are investing billions of dollars in 5G, private wireless, tactical private wireless and more. For instance, the Commercial Solutions for Classified (CSfC) program established several years ago by the National Security Agency, is leveraging commercial technologies and products to deliver cybersecurity solutions quickly for the Department of Defense (DoD) and the intelligence community.

Securing Government Desktops from Cyber Threats with the Latest Belkin Secure KVM Technology
Provided By: Belkin International   Send Email to POC   View Content   Aug 2023
Terrorists and cyber criminals view federal, state, and local government IT infrastructure as an extremely attractive target for disruption, attacks, and data theft. Attacks have taken down entire systems, destroyed valuable equipment, and left many government agencies repeatedly vulnerable in countries worldwide. For the past 30 years, Belkin has worked with Information Assurance and Technology directors and strategic application personnel in federal work environments. Its SKVM switch solution is NIAP-listed and approved to the latest SKVM testing standard NIAP PP 4.0. ...

The Cyber Edge July 2023
Provided By: AFCEA   Send Email to POC   View Content   Jul 2023
Learn about the how the State Department is improving its Cyber State, new offensive cyber opeartions, and how Security Force Assitance Command is blazing Army network trails.

Engineering Effective Network Detection and Response for the Enterprise
Provided By: OpenText   Send Email to POC   View Content   Jul 2023
Network security engineers and architects face numerous challenges in complex enterprises, equipping the security operations center (SOC) with valuable tools to defend against sophisticated cyber adversaries. Network detection and response (NDR) is an important part of network security, and it involves using various tools and techniques to detect, analyze and respond to threats on a network.

What to Look For In A Network Detection And Response Platform
Provided By: OpenText   Send Email to POC   View Content   Jul 2023
OpenText engaged Ari Kaplan Advisors to anonymously survey corporate legal leaders to understand how pre-existing trends and the pandemic have affected in-house legal professionals' approach to eDiscovery. This paper presents respondents' perspectives regarding immediate challenges, long-term opportunities and their impressions of the industry moving forward.

5G: Bringing Bandwidth to the Tip of the Spear
Provided By: Nokia   Send Email to POC   View Content   Jun 2023
Today, the ubiquity of information technology in the military is transforming the communication function itself. The U.S. military has moved to an interconnected battlespace, where data needs to move seamlessly between air, land, sea, space and cyber in real time. That means there is a need for internet bandwidth, capable of supporting ultra-high data demands-a 5G-powered network.

Introducing Spectrum Compact - a truly handheld spectrum analysis tool for Electromagnetic Warfare
Provided By: SAF North America LLC   Send Email to POC   View Content   Jun 2023
Modern electromagnetic warfare (EW) scenarios raise the bar for any electronic devices deployed in the field, including the much-needed radiofrequency spectrum analyzers. Spectrum Compact is a truly handheld RF analysis tool; capable of operating long hours in the field, with an instant ON/OFF function, multiple test modes, and an easy-to-use interface housed in an IP-54-rated body. It is compatible with most standard antenna systems, can be mounted on a drone, or vehicle, and provides remote control options to the operator. Spectrum Compact requires little to no RF exp ...

Spectrum Compact EW Solutions - Handheld Spectrum Analyzers
Provided By: SAF North America LLC   Send Email to POC   View Content   Jun 2023
The use of Handheld Spectrum analyzers has proven to contribute and support electromagnetic battle management. Spectrum Compact by SAF Tehnika (US, Latvia) is a perfect tactical solution for such operations in the field. Weighing less than six hundred grams, and compatibility with standard antenna systems Spectrum Compact can be easily deployed in a Tactical Operations Center or on a mobile platform. It can be operated from the ground level, in the air, and even remotely using an API or the Spectrum Manager PC Software.

10 Ways to Win with GovCon Reporters at Trade Shows
Provided By: Boscobel Marketing Communications   Send Email to POC   View Content   May 2023
It is important for government contractors to work with reporters to bring awareness to their company, brand and solutions. Understanding what works best for reporters to develop a story facilitates collaboration and trust. Trade shows present a great opportunity for companies to connect with reporters. Here are 10 best practices to ensure that you create these vital relationships.

Ensuring Operational Readiness with a Data-Led Approach to Zero Trust
Provided By: Commvault   Send Email to POC   View Content   May 2023
Government agencies, like any other modern organization, run on data. To accomplish their mission, employees need easy access to the right data at the right time, and many government services must ensure citizens have access to services virtually. Rising cyberthreats and growing concerns about privacy amplify the data readiness challenge for agencies needing to find ways to keep data secure without impeding operational readiness. Balancing access against data protection can be an extremely difficult balance to strike. This challenge is at the heart of the emerging zero ...

<< PREVIOUS PAGE  
  NEXT PAGE >>
RSS Feed