GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity Content

Understanding CMMC Compliance

Cybersecurity Maturity Model Certification (CMMC) is a framework of various cybersecurity standards and best practices that is a requirement for government contractors working with the Department of Defense (DoD). Better…

Learn More

Cybersecurity in SATCOM

In March of 2020, what had been a nice-to-have for streaming video and shopping online became essential as millions of people converted to a work-from-home model almost overnight. The COVID-19…

Learn More

Cybersecurity Quarterly

This quarter’s theme is cyber defense—not a new topic, but one where there have been a number of very important recent advances. These advances support the promise of a future…

Learn More

Cybersecurity In the Nuclear Sector

Nuclear power reactors produce 20% of our nation’s electricity. Ensuring the safety and security of these facilities is a top priority. Since the September 11, 2001 terrorist attacks, the Nuclear…

Learn More

MindBody Cybersecurity Whitepaper

Keeping your data secure, confidential, and readily accessible are our greatest priorities. Mindbody’s industry-leading cybersecurity program is based on the concept of Defense in Depth: securing our organization and your…

Learn More

Advancing Cybersecurity at Scale in the Cloud

Cyber attacks in the public sector are on the rise. According to a July 2019 report by a Senate homeland security subcommittee, the number of cyberattacks reported by federal agencies…

Learn More

Cybersecurity for Small Business

Someone in your company gets an email. It looks legitimate, but with one click on a link, or one download of an attachment, everyone is locked out of your network.…

Learn More

IoT Device Cybersecurity Guidance for the Federal...

Federal agencies will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and implementation of IoT devices.…

Learn More

Improving the Nation’s Cybersecurity

The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy. The Federal Government…

Learn More

Cybersecurity, Emerging Technology and Systemic...

Our forward look at technology trends shows a picture of increased complexity, pace, scale and interdependence. The emerging technology environment will overwhelm many of the risk mitigations that are currently…

Learn More

Cybersecurity Maturity Model Certification (CMMC)

Department of Defense (DoD) requires proof of CMMC compliance to ensure protection of controlled unclassified information (CUI) from nation-state and nefarious actors, while keeping the supply chain running safely. Is…

Learn More

Critical Cybersecurity Hygiene: Patching the...

Cyber hygiene describes recommended mitigations for the small number of root causes responsible for many cybersecurity incidents. Implementing a few simple practices can address these common root causes. Patching is…

Learn More

Integrating Cybersecurity into the Acquisition...

“Cybersecurity is seen as ‘the CISO’s problem’ and is almost never considered an integral element to an IT acquisition, although it should be.” This quote is from a state chief…

Learn More

Cybersecurity Lessons From the Pandemic

The COVID-19 pandemic illustrates the challenge of ensuring resilience and continuity in a connected world. Many of the effects of this new breed of crisis can be significantly ameliorated through…

Learn More

Prioritizing Cybersecurity Risk for Enterprise...

This document is the second in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM). This series provides additional detail regarding the enterprise…

Learn More