GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IoT Content

Establishing a Zero Trust Model in IoT Environments

Establishing a Zero Trust Model in IoT Environments

In February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…

Learn More
A Zero Trust Approach to Securing Your IoT Devices

A Zero Trust Approach to Securing Your IoT Devices

Digital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…

Learn More
Why the United States and EU Should Seize the Moment to Cooperate on Cybersecurity Labeling for IoT Devices

Why the United States and EU Should Seize the...

The United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…

Learn More
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations

People’s Republic of China-Linked Actors...

The Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…

Learn More
Global Mobile Trends 2023 Navigating an uncertain world

Global Mobile Trends 2023 Navigating an uncertain...

Much has changed since our first publication of Global Mobile Trends in 2016. Technology has advanced, companies have come and gone, and a pandemic has affected everyone. As ever, the…

Learn More
Zero Trust OT Security for Government & Critical Infrastructure

Zero Trust OT Security for Government & Critical...

IoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…

Learn More
2022 Cybersecurity & Privacy Annual Report

2022 Cybersecurity & Privacy Annual Report

During Fiscal Year 2022 (FY 2022) – from October 1, 2021, through September 30, 2022 –the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) Cybersecurity and Privacy…

Learn More
The Evolution of RBAC to ABAC

The Evolution of RBAC to ABAC

The complexities of today’s IT landscape—think cloud apps, data silos, mobile, IoT, and Big Data—have exposed the limitations of role-based access control (RBAC) solutions, leaving organizations, federal government, and military…

Learn More
Implementing a Zero Trust Architecture NCCoE

Implementing a Zero Trust Architecture NCCoE

In this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…

Learn More
Three Key Technology Advancements Enabling Law Enforcement Modernization

Three Key Technology Advancements Enabling Law...

Much like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…

Learn More
Global Community Technology Challenge (GCTC) Strategic Plan 2024-2026

Global Community Technology Challenge (GCTC)...

This document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division of the Communications…

Learn More
Consumer Safety Tips for Lithium-Ion Battery-Powered Micromobility Devices

Consumer Safety Tips for Lithium-Ion...

Did you know the lithium-ion batteries powering e-bikes and scooters are considered hazardous materials? These batteries store a lot of energy and, if not properly maintained, can pose fire risks…

Learn More
Deep Scan Forensic Analysis for Government Agencies

Deep Scan Forensic Analysis for Government Agencies

Deep Scan capability delivers unmatched forensic analysis on iOS and Android devices. This advanced feature provides critical visibility into device forensics, including filesystem configurations, active processes, and suspicious applications. Enhance…

Learn More
#StopRansomware: RansomHub Ransomware

#StopRansomware: RansomHub Ransomware

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency, the Multi-State Information Sharing and Analysis Center, and the Department of Health and Human Services are releasing this…

Learn More
Protecting Against Malicious Use of Remote Monitoring and Management Software

Protecting Against Malicious Use of Remote...

The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) have released this joint cybersecurity advisory (CSA) to warn network defenders…

Learn More