GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity Content

Cybersecurity Incentives Policy White Paper

In March 2019, pursuant to section 219 of the Federal Power Act (FPA), the Commission issued a Notice of Inquiry seeking comment on the scope and implementation of its electric…

Learn More

The Internet of Things in the Cybercrime...

The internet of things (IoT) continues to influence many aspects of today’s society. IoT devices are increasingly being used in homes and businesses to improve user experience and innovate services.…

Learn More

BeOn® Security Cybersecurity for Critical...

IP-based technologies are prevalent in wireless communications systems now more than ever. This offers flexibility, broader practical use case scenarios and greater economy of scale. Other benefits include a common…

Learn More

Anatomy of Mobile Attacks

As the worldwide leader in enterprise mobile security, Zimperium is uniquely qualified to explain the anatomy of various attacks. If you would like to learn more about actual mobile attacks…

Learn More

The State of DDoS Weapons

DDoS attacks continue to grow in frequency, intensity, and sophistication. However, the delivery method of using infected botnets and vulnerable servers to perform crushing attacks on a massive scale has…

Learn More

Zero Trust Architecture: A Paradigm Shift in...

Given that cyberattacks can lead to devastating losses of money, trust and reputation, companies have an intrinsic incentive to strengthen their security set-up. The demand for an appropriate level of…

Learn More

Security Network Auditing: Can Zero-Trust Be...

Since 2010, government and business organizations have begun to adopt the Zero-Trust framework. Although the concept is a decade old, organizations are still in the infant stages of its implementation.…

Learn More

Getting Started with Zero Trust: Never Trust,...

Zero Trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can…

Learn More

The Rise of Zero Trust: Separating the Reality...

Companies are under intense and growing pressure to demonstrate that they’re taking proper steps to protect the enterprise from cyber attacks and prevent the compromise of sensitive data. Currently, the…

Learn More

Demystifying Zero Trust

The age of the corporate network and single security perimeter is coming to an end. Users are increasingly working remotely, conducting their work over the public internet. The rise of…

Learn More

Implementing a Zero Trust Architecture

The proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved conventional network boundaries. The workforce is more distributed, with remote workers who need access to…

Learn More

Building the Government a Passwordless Foundation

The CEO of HYPR, an innovative tech company focused on passwordless security, discusses the foundation of passwordless tech for government, what’s next for passwordless security, and what that means for…

Learn More

America’s Critical Infrastructure in the...

<p>While critical infrastructure faces vulnerabilities that expand far beyond the cyber sphere, including technical failure and natural disaster, in recent years cyber threats have grown from “potential” and “future” problems…

Learn More

Cyber Protection: A Fresh Framework for the US...

<p>In this whitepaper from Acronis SCS, learn about how cyber protection is the new, fresh framework for the US public sector. With the world’s data doubling every two years, the…

Learn More

Resilient PNT: How to Detect, Protect and Prevent...

For the last two decades, reliance upon GPS/GNSS for positioning, navigation and timing (PNT) by civilian applications has been an overwhelming success, providing increasingly accurate and reliable PNT information everywhere…

Learn More