Browse over one thousand military and government white papers, eBooks, case studies, infographics, and data sheets.
Search by topic, agency, keyword, and more to find government-related content that explores the challenges, trends and solutions available to government organizations. Or, simply start browsing the latest content below. Government white papers include research findings on a wide range of topics such as blockchain, big data, cybersecurity, defense, and emergency management, among others.
Your free membership allows you to save your favorite content as well as save your searches to keep you notified when new, relevant content is posted.
Several U.S. technology companies have played important roles in supporting Ukraine’s military to combat Russia’s full-scale invasion of the country and in helping the Ukrainian government maintain critical functions. This…Learn More
During the past 20 years, the People’s Republic of China (PRC or China) has significantly increased its investment overseas. In 1999, China launched its “Go Global Strategy” to support the…Learn More
Water and Wastewater Systems Sector entities (herein referred to as “water systems”) run operational technology (OT) and information technology (IT) systems that are too often vulnerable to cyberattacks. This fact…Learn More
The constitutional transfer of power and authority from an incumbent American President to a successor is a momentous occasion in American government. In the present day, this transfer of authority…Learn More
The Advanced Technology Academic Research Center (ATARC) and Tidelift brought together government and industry leaders to discuss the challenges and approaches to open source security. Roundtable participants shared their insights…Learn More
Successful modernization involves both human and technology elements — people, culture, processes, and systems. But with any project, bottlenecks can form that impede and delay progress. At this roundtable, Federal…Learn More
Threats to IT infrastructure and individuals are becoming more sophisticated and harder to identify, especially on mobile devices. Research shows major advanced persistent threat (APT) and nation state actors are…Learn More
Political objectives are usually achieved by using one’s military power. Converting political objectives into achievable military-strategic objectives is the primary responsibility of military-strategic leadership. This process is largely an art…Learn More
The United States electoral process, and indeed American democracy itself, is under great stress. Over the last two decades, hyperpolarized politics and very close elections have led to fights over…Learn More
Friction between the United States and the People’s Republic of China on technology captures the headlines regularly. While there continue to be intellectual property rights violations in China, China analysts…Learn More
This article proposes an approach to nuclear force sizing debates based on a framework built on four analytic dimensions: overarching risk management approaches; deterrence and assurance objectives; strategic force employment…Learn More
Cyber leaders find their organizations under constant cyber attack from millions of daily intrusions disrupting everything from our electoral system to our social media feeds. Today, cyberspace provides both technological…Learn More
The Department of Defense needs a new approach to electrical grid infrastructure to maintain security and access to operational energy. Recent natural disasters and cyberattacks have exposed the vulnerability of…Learn More
The jamming and spoofing of Global Positioning System (GPS) and the Automatic Identification System (AIS) information has escalated in the last half-dozen years from simple demonstrations of capability to truly…Learn More