GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IoT Content

IoT for the Public Sector: Moving from Risk to Reward

IoT for the Public Sector: Moving from Risk to...

The public sector is increasingly turning to IoT to enhance mission outcomes—from streamlining city traffic to improving classroom safety and enabling remote healthcare in rural areas. But with over 30%…

Learn More
Why the United States and EU Should Seize the Moment to Cooperate on Cybersecurity Labeling for IoT Devices

Why the United States and EU Should Seize the...

The United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…

Learn More
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations

People’s Republic of China-Linked Actors...

The Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…

Learn More
Growing Use Cases for the Ever-Evolving Digital Twin

Growing Use Cases for the Ever-Evolving Digital...

Digital twin technology is expanding rapidly, bridging the physical and digital worlds to improve design, operations, and decision-making. By integrating AI, IoT, and analytics, organizations can simulate real-world assets to…

Learn More
Executive Order 14306: Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144

Executive Order 14306: Sustaining Select Efforts...

Executive Order 14306 reinforces America’s cybersecurity defenses amid escalating threats from foreign adversaries like China, Russia, and North Korea. It expands efforts around secure software development, quantum-resistant encryption, and AI-powered…

Learn More
Strengthening Cyber Resilience for Critical Infrastructure

Strengthening Cyber Resilience for Critical...

State and local governments sit at the heart of critical infrastructure protection, facing rising cyber threats against systems that power water, energy, transportation, and healthcare. This overview emphasizes the need…

Learn More
Methodology for Characterizing Network Behavior of Internet of Things Devices

Methodology for Characterizing Network Behavior of...

NIST outlines a methodology for understanding and documenting the network behavior of Internet of Things (IoT) devices. By capturing traffic across different life-cycle stages—setup, normal operation, and decommissioning—organizations can generate…

Learn More
Report on the Design-A-Thon

Report on the Design-A-Thon

NIST’s report documents the first Design-A-Thon, held at the 2024 SOUPS conference, which explored creative approaches for digital product cybersecurity education and awareness. Participants worked in teams to design strategies…

Learn More
Empowering Your Zero Trust Strategy in the Federal Government

Empowering Your Zero Trust Strategy in the Federal...

As cyber threats grow in complexity, federal agencies are rethinking their security frameworks with a Zero Trust mindset—one that assumes no user, device, or network can be inherently trusted. This…

Learn More
Report on the Design-A-Thon

Report on the Design-A-Thon

NIST hosted a Design-A-Thon to explore creative ways to educate users about cybersecurity for digital products like IoT devices. Participants developed strategies ranging from storybook manuals and songs for children’s…

Learn More
Digital Twin Lab

Digital Twin Lab

The National Institute of Standards and Technology (NIST) has launched a Digital Twin Lab to accelerate innovation in U.S. manufacturing. This lab serves as a testbed for developing standards, prototyping…

Learn More
Preserve Your Long-Term Records in Microsoft 365

Preserve Your Long-Term Records in Microsoft 365

Digital records stored in Microsoft 365 face a silent threat — over time, file formats change, systems evolve, and crucial information risks becoming unreadable. Preserve365® bridges this gap, ensuring records…

Learn More
The Evolution of RBAC to ABAC

The Evolution of RBAC to ABAC

The complexities of today’s IT landscape—think cloud apps, data silos, mobile, IoT, and Big Data—have exposed the limitations of role-based access control (RBAC) solutions, leaving organizations, federal government, and military…

Learn More
Clear the Road for Connected Operations: How Government Agencies Can Implement Efficiency-Driving Digital Solutions

Clear the Road for Connected Operations: How...

In today’s fast-paced world, connected operations are revolutionizing how public and private fleets manage efficiency, safety, and sustainability. This transformation is fueled by real-time data from IoT devices, helping teams…

Learn More
2025 State of Operational Technology and Cybersecurity Report

2025 State of Operational Technology and...

Operational Technology (OT) environments are becoming more connected—and more exposed—to cyber threats. Fortinet’s report reveals that organizations are maturing in both process and solution adoption, with more CISOs taking ownership…

Learn More