Browse over one thousand military and government white papers, eBooks, case studies, infographics, and data sheets.
Search by topic, agency, keyword, and more to find government-related content that explores the challenges, trends and solutions available to government organizations. Or, simply start browsing the latest content below. Government white papers include research findings on a wide range of topics such as blockchain, big data, cybersecurity, defense, and emergency management, among others.
Your free membership allows you to save your favorite content as well as save your searches to keep you notified when new, relevant content is posted.
Roundtable 4: Capstone This capstone discussion brought together key findings from previous roundtables on the government's role in hiring, using, and buying AI. Participants emphasized the need for more flexible,…
Learn MoreRoundtable 3: Government as a Buyer of AI As AI technologies advance, federal agencies face mounting challenges in responsibly procuring and managing AI tools. Roundtable participants emphasized the need for…
Learn MoreRoundtable 2: Government as an Employer of AI Talent As the U.S. government ramps up efforts to integrate artificial intelligence across its operations, a key challenge remains: attracting and retaining…
Learn MoreBlackBerry® AtHoc® achieves FedRAMP High authorization, reinforcing its ability to deliver secure, encrypted communication during critical events like cyberattacks and natural disasters. With 421 stringent security controls, it ensures operational…
Learn MoreSegregation of duties (SoD), also called separation of duties, is a fundamental aspect of sustainable internal controls and risk management. The purpose of SoD is to prevent fraud, conflicts of…
Learn MoreWhen every conversation matters, BlackBerry® SecuSUITE® safeguards sensitive communications for governments and mission-critical enterprises. With government-grade security and end-to-end encryption, it secures voice, messaging, and file sharing while offering unparalleled…
Learn MoreRoundtable 1: Government as a User of AI This roundtable report explores how the U.S. government can responsibly adopt and use artificial intelligence across federal agencies. Key discussions covered the…
Learn MoreFast flux is a DNS-based evasion technique that allows malicious actors to hide their infrastructure and maintain resilient command-and-control operations. This tactic rapidly changes IP addresses linked to malicious domains,…
Learn MoreThis report from Graphika highlights how Chinese state-aligned influence operations are amplifying narratives aimed at undermining U.S. policies and strengthening China’s global position. From spreading criticism of U.S. tariffs to…
Learn MoreSmall Modular Reactors (SMRs) offer a promising path forward for nuclear energy—providing clean, reliable, and potentially more affordable power through factory-built, scalable designs. This report outlines how SMRs could serve…
Learn MoreChina’s state-backed e-commerce platforms—like Temu, SHEIN, and AliExpress—are expanding rapidly in the U.S., leveraging subsidies, tax breaks, and government-supported infrastructure to gain market dominance. These platforms exploit gaps in U.S.…
Learn MoreThis poster from the Office of Congressional Workplace Rights outlines the protections afforded to legislative branch employees under the Congressional Accountability Act. It covers a wide range of rights, including…
Learn MoreThis study examines how Alaska schools are adopting trauma-engaged practices, finding that most are in the early stages of implementation despite growing awareness of childhood trauma’s impact on student well-being.…
Learn MoreOnline and digital scams continue to evolve, using phishing emails, fake websites, and fraudulent shopping schemes to target unsuspecting users. These scams often lure victims with too-good-to-be-true offers, urgent security…
Learn MoreImposter scams are on the rise, with fraudsters posing as trusted figures—like government officials, relatives, or tech support—to steal personal information or money. Common tactics include urgent demands for payment…
Learn More