Browse over one thousand military and government white papers, eBooks, case studies, infographics, and data sheets.
Search by topic, agency, keyword, and more to find government-related content that explores the challenges, trends and solutions available to government organizations. Or, simply start browsing the latest content below. Government white papers include research findings on a wide range of topics such as blockchain, big data, cybersecurity, defense, and emergency management, among others.
Your free membership allows you to save your favorite content as well as save your searches to keep you notified when new, relevant content is posted.
The Absolute Secure Access platform is available as a cloud-hosted, SaaS solution that allows customers to harness Absolute’s Zero Trust Network access, experience monitoring and enterprise next gen VPN capabilities…
Learn MoreThe 2024 Absolute Security Cyber Resilience Index Report identifies key enterprise security risk factors that cyber resilience technologies mitigate. Other security and risk professionals learn how to determine whether identified…
Learn MoreThe Cybersecurity Maturity Model Certification (CMMC) is a framework developed by the U.S. Department of Defense (DoD) to enhance the cybersecurity posture of organizations in the Defense Industrial Base (DIB),…
Learn MoreThe evolving landscape of modern warfare and industrial operations has placed a premium on dependable and efficient manufacturing solutions. Snowbird Technologies meets these challenges with a visionary approach, spearheading a…
Learn MoreThe introduction of generative AI into the public domain has brought both significant opportunities and challenges to national security. While panelists are encouraged by the positive outcomes of recent AI…
Learn MoreThe Future of Secure Work Base Paper outlines how the US Government (USG) has acknowledged the utility of mobile devices across environments. However, agencies that use sensitive or classified information…
Learn MoreFederal agencies are dependent on IT systems and electronic data to carry out operations and to process, maintain, and report essential information. Virtually all federal operations are supported by computer…
Learn MoreFermi provides a unique view of the universe and allows us to study some of its most curious phenomena. Fermi’s position in low-Earth orbit enables it to detect thousands of…
Learn MoreTraditional cybersecurity strategies have long been focused on protecting your fixed endpoints such as servers, laptops and desktops from cyberthreats. However, your security requirements have grown organically over time. The…
Learn MoreDealing with legacy code is a routine occurrence, yet the unknowns within the code pose significant risks. When the time comes to refresh or update technology, modernizing legacy systems can…
Learn MoreIn this paper, a series of arguments and predictions about how existing and future privacy and data protection regulation will impact the development and deployment of artificial intelligence (AI) systems…
Learn MoreDeploying artificial intelligence (AI) systems securely requires careful setup and configuration that depends on the complexity of the AI system, the resources required (e.g., funding, technical expertise), and the infrastructure…
Learn MoreOn October 20, 2023, the Biden Administration submitted to Congress a request for FY2024 emergency supplemental appropriations to address “key national security priorities.” President Biden characterized the request as a…
Learn MoreFrom the medical field to the entertainment industry, artificial intelligence (AI) changes how humans go about their private lives, redevelops how businesses function, and overall alters human society and culture.…
Learn MoreRegScale overcomes limitations in legacy GRC by bridging security, risk, and compliance through their Continuous Controls Monitoring platform. Their CCM pipelines of automation, dashboards, and AI tools deliver lower program…
Learn More