Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...


SIGNAL Executive Video: Working Toward More Agile Defense Acquisition
Author: Red Hat   Send Email to POC   View Content
The public perception of the defense acquisition process is like that of the weather: Everyone complains about it, but no one does anything about it. That perception is wrong; many people in both government and industry are working to improve the process, and a host of initiatives are geared toward ensuring that innovation is sped to the warfighter and the decision maker as quickly as possible.

But acquisition is driven by laws and regulations, which of course originate from the government. For the Defense Department to truly reap the benefits of innovation, it m ...

Choosing the Best Mobility Management Solution: TCO, Satisfaction, Data Protection and Security
Author: Blackberry   Send Email to POC   View Content
VDC Research conducted a comparative analysis of the mobility management, data protection and security capabilities of BlackBerry's unified endpoint management (UEM) solution and Microsoft's Intune UEM solution. Each was assessed on the level of assurance and utility they provided, their cost effectiveness/total cost of ownership (TCO), and their impact on user experience. This whitepaper will detail the changing nature of end-user computing deployment environments, discuss the need for modern mobility management and collaboration tools that provide secure access to Saa ...

Author: Leonardo   Send Email to POC   View Content
TABLE OF CONTENTS 1. Threats evolution in the cyber-space 2. Situational awareness to face multi-domain threats 3. Cyber situational awareness: Leonardo solution 4. AI to improve human performance and decision-making processes 5. Who we are

How Red Hat Satisfied Lockheed Martin's Need for Speed on the F-22
Author: Red Hat   Send Email to POC   View Content
Lockheed Martin's F-22 Raptor is one of the most advanced fighter jets on the planet not to mention one of the fastest. But over the past few years, as other nations began to test-fly and deploy their own fifth-generation fighters, Lockheed Martin realized that its software development practices were holding it back, delivering new capabilities to the Raptor too slowly to maintain its dominance. With Red Hat's agile development practices and automated software production pipeline, Lockheed Martin was able to build and deploy new capabilities for the plane at supersonic ...

Protecting Critical Infrastructure in the DoD Landscape
Author: Owl Cyber Defense   Send Email to POC   View Content
This document includes an overview of critical infrastructure, the associated cybersecurity challenges including a background on industrial control system (ICS) security, and provides a synthesis of the most recent available guidance to secure critical infrastructure and the various supporting systems within a defense context. It is intended as a best practice primer for the cybersecurity of DoD critical infrastructure, and to provide a basic foundation of accumulated knowledge.

Deception to Enhance Endpoint Detection and Response
Author: Attivo Networks   Send Email to POC   View Content
Endpoint Detection and Response (EDR) systems have become more popular as the technology has advanced. As a result, organizations have shifted their security focus, and budget, to bolstering internal endpoint defenses and away from defending the perimeter. In this paper, Attivo Networks will delve into how deception technology complements EDR to make an organization's internal defenses more robust, complementing existing technologies and improving overall security.

SIGNAL Executive Video: Seizing the Reins of Long-Term Data Retention
Author: Thundercat & Veritas   Send Email to POC   View Content
From individuals to huge social media firms, everyone is awash in data. Warehousing it is not a problem-we have the cloud for that. For many organizations, the challenge is to be able to access the information they immediately need from the mountains of data that threaten to overwhelm their operations.

And that touches upon another challenge: how much data must be kept to meet government record-keeping regulations? Tossing data helps remove information that no longer is necessary for daily operations, but that data might be needed for legal reasons. So, widesprea ...

Dynamic Deception for Industrial Automation and Control Systems
Author: Attivo Networks   Send Email to POC   View Content
The implementation of a comprehensive cybersecurity plan to protect Industrial Automation and Control Systems (IACS), including SCADA, is critical to protecting confidential company information, complying with applicable laws and maintaining safe and reliable operations. A defense-in-depth approach to cybersecurity reduces risk with each effective layer of protection and combines a mix of defense and offense measures for the maximum protection against a breach. The implementation of a Dynamic Deception solution provides the real-time visibility into threats that have by ...

The Cyber Edge April 2019
Author: AFCEA   Send Email to POC   View Content
This edition of The Cyber Edge celebrates and recognizes the contributions of women in cybersecurity and STEM. All of the articles in the section were written by women and feature expert opinions on operating in a time where information often can be a weapon.

7 Ways Hackers Look to Exploit Federal Agencies
Author: Core Security, a HelpSystems Company   Send Email to POC   View Content
Federal agencies are often high targets of attackers to obtain access to your environment, steal data, or leak information. There are seven common ways hackers try to get into federal agencies. In this guide you'll receive descriptions of each type, real-world examples of why hackers want data in that way, and strategies for protecting against common hacker methods.

Expanding Link 16's Reach Through Concurrent Multiple Reception
Author: ViaSat, Inc.   Send Email to POC   View Content
From the end of the Cold War to the present era, there has been a growing need for military platforms to coordinate for operations and to share information. The Link 16 family of data links has been central to providing critical battlefield information to the U.S. and its allies since the 1980s.

Red Hat Helps Organizations Make Agile a Reality
Author: Red Hat   Send Email to POC   View Content
Talk about taking on a big job: Red Hat wants to bring agile software production practices and the company's OpenShift application development platform into the Department of Defense with their decades of constraints, habits and bureaucracy

How DevSecOps Helped Address Data Integration Challenges in Healthcare
Author: ManTech   Send Email to POC   View Content
How DevSecOps Helped Address Data Integration Challenges in Healthcare

BlackBerry Technology Secures Government Communications
Author: Blackberry   Send Email to POC   View Content
When the NATO Communications and Information Agency (NCIA) went looking for technology to enable alliance officials to use smartphones without being eavesdropped on by hackers or spies, they immediately came up against a problem.

Intelligent Systems Boost End-to-End Military Operations
Author: Microsoft   Send Email to POC   View Content
As conflicts become faster and more complex with multiple platforms and data streams feeding information to warfighters, there is a growing need to manage this process to improve operational efficiency. The Department of Defense (DOD) is investing in cloud and machine learning tools and systems to help improve situational awareness and connectivity at the last tactical mile

Hypersonic Flight Raises the Bar for Embedded Electronics
Author: Abaco   Send Email to POC   View Content
This white paper looks at how hypersonic flight will place radical new demands on the embedded computing systems on which they will rely - in terms of not only new levels of performance, but also of new levels of ruggedness

TACLANE Render Useless Zeroize (RUZ) Feature for Unattended Operation and High Risk Deployments
Author: General Dynamics Mission Systems   Send Email to POC   View Content
TACLANE RUZ feature supports integration in unmanned and manned platforms, forward deployed and sensor applications. Interested in learning more? Request the RUZ whitepaper now!

The Total Economic Impact of ServiceNow Security Operations
Author: ServiceNow   Send Email to POC   View Content
A January 2018 commissioned study conducted by Forrester Consulting on behalf of ServiceNow How a Representative Organization Resolved Security Incidents 45% Faster This Forrester Study provides a framework and customer example to help readers evaluate the potential financial benefits of investing in ServiceNow Security Operations. To understand and illustrate the benefits, costs, and risks associated with ServiceNow, Forrester interviewed three current Security Operations customers to create a representative organization. This organization: Improved vulnerability respo ...

The hybrid cloud advantage for Government
Author: Kemp Technologies   Send Email to POC   View Content
"Hybrid Cloud" is used to describe an application hosting approach that spans the range of private datacenter, hosted datacenter, virtual computing, cloud computing, and the many variations between and among these approaches. Selecting the best approach for application hosting enables federal customers to quickly take advantage of the opportunities within each approach.

TACLANE Agile Performance Enhancing Proxy (PEP)
Author: General Dynamics Mission Systems   Send Email to POC   View Content
Our new TACLANE Agile Performance Enhancing Proxy (PEP) software feature will increase your network availability and accelerate the performance of your mission in disadvantaged networks. Secure your mission's success and request the PEP whitepaper today!