GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity Content

The Six Pillars of a Zero Trust Security Model for...

Zero Trust, Always Verify: Recalibrating Enterprise Security to Protect Your Most Critical Enterprise Assets for Cybersecurity in Federal Government The constant evolution of business requires the protection of assets. With…

Learn More

Trust In Smart City Systems: Characteristics and...

The Smart Cities Council, a global advocate for smart city adoption, states that the term “smart cities” still lacks a universally agreed upon definition. However, the term generally refers to…

Learn More

Noblis ScanCenter – A Premier Continuous...

The Noblis Continuous Monitoring as a Service (CMaaS) solution utilizes our ScanCenter application to achieve comprehensive agency FedRAMP compliance at speed and at scale. The Noblis CMaaS solution significantly eases…

Learn More

International Security in Cyberspace: New Models...

In this ever more Internet-connected age, it is no surprise that cyber threats continue to increase. The more indispensable such connectivity is for commerce, communications, and innumerable aspects of daily…

Learn More

Cyberspace Solarium Commission

For over 20 years, nation-states and non-state actors have used cyberspace to subvert American power, America security, and the American way of life. Despite numerous criminal indictments, economic sanctions, and…

Learn More

The Cyberspace Solarium Commission: Illuminating...

In August 2018, Congress authorized the Cyberspace Solarium Commission (Commission), a blue-ribbon panel tasked with examining and developing a strategic approach to defending the United States in cyberspace and protecting…

Learn More

Defense Acquisitions: DOD’s Cybersecurity Maturity...

Cybersecurity threats represented by cyberattacks and data theft have had a significant impact on the Department of Defense (DOD) and the defense industrial base (DIB). These threats have become a…

Learn More

Cybersecurity Maturity Model Certification (CMMC)

The theft of intellectual property and sensitive information from all industrial sectors due to malicious cyber activity threatens economic security and national security. The Council of Economic Advisors estimates that…

Learn More

A Framework for Assessing Email Security Risk

This paper is intended to be used as a tool for information security professionals to assess risks associated with email infrastructure. Email vulnerabilities can harm organizations in two key ways:…

Learn More

Higher Education Research, Cybersecurity, and CMMC...

EDUCAUSE is a higher education technology association and the largest community of IT leaders and professionals committed to advancing higher education. Technology, IT roles and responsibilities, and higher education are…

Learn More

Securing the Defense Supply Chain

The Department of Defense’s DFARS Interim Rule mandates that defense contractors not only perform a self assessment based on NIST 800-171, but also report that score to the DoD. The…

Learn More

Complying with the Department of Defense’s...

The Director of National Intelligence’s annual Worldwide Threat Assessment report has for several years  identified cyber threats as one of the most important strategic threats facing the United States. The…

Learn More

Supply Chain-Based Phishing Attacks on the Rise

Unfortunately, BEC continues to evolve with attackers using account takeovers (ATOs) as a crucial element of supply chain attacks. Compromised credentials and emails lend authenticity to sophisticated Type 3 and…

Learn More

Detect Threats Before They Become Breaches With...

As high-profile security breaches continue to plague large companies and public sector organizations, it’s more important than ever to have a comprehensive managed detection and response solution in place. If…

Learn More

The Story Behind 140,000 Missed Phish

To secure resources and employees, companies have invested heavily in SEGs . However, phish continue to arrive by the millions in employee inboxes; each one posing a potential disaster. The…

Learn More