GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity Content

5 Cybersecurity Trends Shaping Government Modernization in 2022

5 Cybersecurity Trends Shaping Government...

Cybersecurity is a perennial focus of government, but with a year of high profile cyber incidents behind us, a new federal mandate, and ongoing remote work, 2022 is shaping up…

Learn More
Locking Down Information Management Security on Campus

Locking Down Information Management Security on...

Ultimately, the job of the cybersecurity professional in higher ed is to “plan for the worst day,” as one cybersecurity expert recently noted during a Campus Technology leadership summit. But…

Learn More
BYOD for U.S. DoD

BYOD for U.S. DoD

Department of Defense (DoD) personnel need secure digital access to government data and applications from their personal devices easily, at scale, and without risk of data loss and privacy breach.…

Learn More
IT Modernization for Campus Re-Entry

IT Modernization for Campus Re-Entry

Some colleges and universities are poised to emerge from the pandemic stronger than they went in. In large part, they have used the last year to accelerate the adoption of…

Learn More
Safe & Sound Schools

Safe & Sound Schools

IT professionals in K-12 school systems became heroes to their communities when their skills and resourcefulness turned on remote learning for nearly all. But while IT teams were enabling teaching…

Learn More
Improving Cyber Compliance with Infrastructure Automation

Improving Cyber Compliance with Infrastructure...

Federal government law enforcement agencies need to protect sensitive data such as criminal records and investigations, biometrics, tax filings, security camera footage, and personnel records. Exposure of sensitive information can…

Learn More
Third Party Breach Report

Third Party Breach Report

This year’s report is all about changes. “The only thing that never changes is that everything changes.” said Louis L’Amour, the American novelist. Another way of expressing that sentiment is,…

Learn More
CTG Federal and VMware: Securing and Modernizing Federal Networks Across Multiple Clouds

CTG Federal and VMware: Securing and Modernizing...

Federal operations are becoming more distributed than ever before, and agencies must rely far more on cloud-based services and capabilities to keep pace. With VMware NSX solutions, CTG Federal can…

Learn More
Primer: Cybersecurity and Elections

Primer: Cybersecurity and Elections

The goal of this primer is to support United States Agency for International Development (USAID) Democracy, Human Rights, and Governance (DRG) personnel, as well as the broader DRG community, to…

Learn More
National Cybersecurity Strategy

National Cybersecurity Strategy

The National Security Strategy will position the United States and its allies and partners to build a digital ecosystem together, making it more easily and inherently defensible, resilient, and aligned…

Learn More
NIST Cybersecurity Framework

NIST Cybersecurity Framework

This paper will explore shortcomings of over-reliance on endpoint protection, and encourage supplementing with a robust network visibility-based security strategy.

Learn More
Cybersecurity In the Nuclear Sector

Cybersecurity In the Nuclear Sector

Nuclear power reactors produce 20% of our nation’s electricity. Ensuring the safety and security of these facilities is a top priority. Since the September 11, 2001 terrorist attacks, the Nuclear…

Learn More
Cybersecurity Audit Automation

Cybersecurity Audit Automation

Due to growing cybersecurity infrastructure and increasingly sophisticated cybersecurity threats, continuous monitoring of information security systems through automation is the best way to accurately assess vulnerability across a complex threat…

Learn More
Cybersecurity High-Risk Series: Challenges in Protecting Privacy and Sensitive Data Cybersecurity

Cybersecurity High-Risk Series: Challenges in...

Federal agencies and our nation’s critical infrastructures are dependent on technology systems to carry out fundamental operations and to process, maintain, and report vital information. The security of these systems…

Learn More
Centralizing Supply Chain Cybersecurity

Centralizing Supply Chain Cybersecurity

Black Kite provides the only standards-based cyber risk assessments that analyze your supply chain’s cybersecurity posture from three critical dimensions: technical, financial and compliance. In this paper, the Black Kite…

Learn More