GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity Content

Mitigating the Effects of Network Breaches

What to do before your network is compromised. Breaches are inevitable. The numbers don’t lie – whether internal or external, breaches are inevitable. Supply chain attacks, insider threats, ransomware, malware,…

Learn More

Business Email Compromise in 2021: Supply...

Unfortunately, BEC continues to evolve with attackers using account takeovers (ATOs) as a crucial element of supply chain attacks. Compromised credentials and emails lend authenticity to sophisticated Type 3 and…

Learn More

Guide to Types 1, 2, 3 & 4 Business Email...

Your Challenge: Modern fraud and phishing attacks rely on highly targeted, 1:1 social engineering – not malicious links or malware — making these attacks difficult for your email providers and…

Learn More

1M Ways Attackers Breach Office 365 Email

Read the results of “1 Million Ways Attackers Breach Office 365 Email,” an Area 1 Security study analyzing nearly 1.5 billion messages sent to customers that use Microsoft as their…

Learn More

The Weakest Link: Solving Supply Chain Phishing...

Supply chain attacks, which exploit an organization’s weakest digital links, increasingly threatened organizations in recent years. Your email and digital communications with suppliers, partners, vendors and affiliates represent a significant…

Learn More

Mapping Illumio to NIST SP 800-207 Zero Trust...

Illumio enables agencies and commands to achieve end-to-end Zero Trust via host-based micro-segmentation. The Illumio software architecture directly maps to the core logical components defined in NIST SP 800-207. A…

Learn More

The Other Side of Zero Trust

The federal government has been taking zero trust more seriously. Although a significant part of it has yet to be implemented, some initial work has been completed with zero trust…

Learn More

Achieve Zero Trust with TIC 3.0

The recent and rapid adoption of cloud, mobility and related technologies has dramatically altered the federal IT environment. While these technologies have facilitated the development of a whole new range…

Learn More

Strategic Guidance Survey: Cyber Operations

The old adage that hackers only need to be right once and network defenders have to be perfect all the time hits home nowadays more than ever before. With agency…

Learn More

Evolution of System and Data Integrity

Automate and guarantee the integrity of any data, of any type, in motion and at rest—in real-time. For organizations who require the highest levels of cybersecurity and regulatory compliance, Chainkit…

Learn More

National Critical Functions Status Update to the...

In the Spring of 2019, the Cybersecurity and Infrastructure Security Agency (CISA), through the National Risk Management Center (NRMC), published a set of 55 National Critical Functions (NCFs) to guide…

Learn More

Emergency Communications Systems Value Analysis...

SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), released the Emergency Communications Systems Value Analysis Guide to assist…

Learn More

CyberSecurity Trends 2021: Staying Secure In...

The COVID-19 pandemic has dealt a shock to the ‘system’, thrusting many of us into a spiral of worry and giving the permanence of change a whole new meaning. With…

Learn More

Anatomy of Mobile Attacks

As the worldwide leader in enterprise mobile security, Zimperium is uniquely qualified to explain the anatomy of various attacks. If you would like to learn more about actual mobile attacks…

Learn More

What Local Government Officials Should Know and Do...

Your local government is under constant or nearly constant cyberattack. Findings from a focus group among top IT and cybersecurity staff in several Maryland local governments confirmed that attacks are…

Learn More