GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity Content

National Security Implications of Fifth Generation...

The fifth generation (5G) of mobile technologies will increase the speed of data transfer and improve bandwidth over existing fourth generation (4G)technologies, in turn enabling new military and commercial applications.…

Learn More

Key Practices in Cyber Supply Chain Risk...

In today’s highly connected, interdependent world, all organizations rely on others for critical products and services. However, the reality of globalization, while providing many benefits, has resulted in a world…

Learn More

Getting Ready for Post-Quantum Cryptography

Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information that we communicate and store. The paper describes the impact…

Learn More

Federal Government Needs to Urgently Pursue...

Federal agencies and the nation’s critical infrastructures—such as energy, transportation systems, communications, and financial services—are dependent on information technology systems to carry out operations. The security of these systems and…

Learn More

Protect Your Campus From Cyberthreats With Less...

For cybercriminals, finding vulnerabilities in network infrastructure is second nature. With widespread internet access, multiple mobile devices, online learning and smart classroom tools in higher education, hackers have many ways…

Learn More

Managed Security Service for Government

The cyber threats targeting government networks are constantly evolving. This means agencies need to continually adapt to avoid bad actors gaining access to their networks to steal sensitive data or…

Learn More

Security and Congestion Modeling and Resilience...

New transformative technologies and novel architectures being developed by standards bodies (including the fifth generation (5G) wireless networks) are extremely complex. The benefits of 5G are made possible by virtualization,…

Learn More

GRAYPATH: Next-Generation Quantum Resistant VPN...

It is imperative that organizations question whether their enterprise communications networks built upon 30-year-old VPN and SD-WAN technology are able to support such an effort. Organizations that do ask this…

Learn More

Key Considerations for Configuring Virtual...

With most of the world working from home for the foreseeable future due to COVID-19, we’ve prepared this guide to help you enable and sustain a remote workforce. Download this…

Learn More

How Federal Agencies Face Increasing Cybersecurity...

Today across the country, federal agencies must continually adjust to the pandemic’s impact. The most significant paradigm shift has been to telework and mobile device use by federal employees, contractors,…

Learn More

The Six Pillars of a Zero Trust Security Model for...

Zero Trust, Always Verify: Recalibrating Enterprise Security to Protect Your Most Critical Enterprise Assets for Cybersecurity in Federal Government The constant evolution of business requires the protection of assets. With…

Learn More

Trust In Smart City Systems: Characteristics and...

The Smart Cities Council, a global advocate for smart city adoption, states that the term “smart cities” still lacks a universally agreed upon definition. However, the term generally refers to…

Learn More

International Security in Cyberspace: New Models...

In this ever more Internet-connected age, it is no surprise that cyber threats continue to increase. The more indispensable such connectivity is for commerce, communications, and innumerable aspects of daily…

Learn More

Cyberspace Solarium Commission

For over 20 years, nation-states and non-state actors have used cyberspace to subvert American power, America security, and the American way of life. Despite numerous criminal indictments, economic sanctions, and…

Learn More

The Cyberspace Solarium Commission: Illuminating...

In August 2018, Congress authorized the Cyberspace Solarium Commission (Commission), a blue-ribbon panel tasked with examining and developing a strategic approach to defending the United States in cyberspace and protecting…

Learn More