GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity Content

Cyberspace Solarium Commission

For over 20 years, nation-states and non-state actors have used cyberspace to subvert American power, America security, and the American way of life. Despite numerous criminal indictments, economic sanctions, and…

Learn More

The Cyberspace Solarium Commission: Illuminating...

In August 2018, Congress authorized the Cyberspace Solarium Commission (Commission), a blue-ribbon panel tasked with examining and developing a strategic approach to defending the United States in cyberspace and protecting…

Learn More

Defense Acquisitions: DOD’s Cybersecurity Maturity...

Cybersecurity threats represented by cyberattacks and data theft have had a significant impact on the Department of Defense (DOD) and the defense industrial base (DIB). These threats have become a…

Learn More

Cybersecurity Maturity Model Certification (CMMC)

The theft of intellectual property and sensitive information from all industrial sectors due to malicious cyber activity threatens economic security and national security. The Council of Economic Advisors estimates that…

Learn More

A Framework for Assessing Email Security Risk

This paper is intended to be used as a tool for information security professionals to assess risks associated with email infrastructure. Email vulnerabilities can harm organizations in two key ways:…

Learn More

Higher Education Research, Cybersecurity, and CMMC...

EDUCAUSE is a higher education technology association and the largest community of IT leaders and professionals committed to advancing higher education. Technology, IT roles and responsibilities, and higher education are…

Learn More

Securing the Defense Supply Chain

The Department of Defense’s DFARS Interim Rule mandates that defense contractors not only perform a self assessment based on NIST 800-171, but also report that score to the DoD. The…

Learn More

Complying with the Department of Defense’s...

The Director of National Intelligence’s annual Worldwide Threat Assessment report has for several years  identified cyber threats as one of the most important strategic threats facing the United States. The…

Learn More

Supply Chain-Based Phishing Attacks on the Rise

Unfortunately, BEC continues to evolve with attackers using account takeovers (ATOs) as a crucial element of supply chain attacks. Compromised credentials and emails lend authenticity to sophisticated Type 3 and…

Learn More

Detect Threats Before They Become Breaches With...

As high-profile security breaches continue to plague large companies and public sector organizations, it’s more important than ever to have a comprehensive managed detection and response solution in place. If…

Learn More

The Story Behind 140,000 Missed Phish

To secure resources and employees, companies have invested heavily in SEGs . However, phish continue to arrive by the millions in employee inboxes; each one posing a potential disaster. The…

Learn More

Ransomware: What It Is & What To Do About It

A National Cyber Investigative Joint Task Force (NCIJTF) joint-seal ransomware fact sheet provides the public important information on the current ransomware threat and the government’s response, as well common infection…

Learn More

Building a More Resilient ICT Supply Chain:...

The impacts of the COVID-19 pandemic on the Information Technology and Communication (ICT) sector’s supply chains are still unfolding. To understand how IT companies have been impacted, and to identify…

Learn More

Cybersecurity Maturity Model Certification (CMMC)

Department of Defense (DoD) requires proof of CMMC compliance to ensure protection of controlled unclassified information (CUI) from nation-state and nefarious actors, while keeping the supply chain running safely. Is…

Learn More

Cybersecurity: It’s More than Just Technology

The term “cybersecurity” is commonly associated with the protection of digital data from theft or compromise by hackers. For enterprise customers, however, most data breaches aren’t the result of technology…

Learn More