GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IoT Content

Securing OT/IIoT – A Layered Approach

Securing OT/IIoT – A Layered Approach

While industry shifts towards the convergence of Operational Technology and Information Technology, the need to align with an ever-changing cybersecurity landscape has never been more important. Driven by internal as…

Learn More
Profile of the IoT Core Baseline for Consumer IoT Products

Profile of the IoT Core Baseline for Consumer IoT...

This publication documents the consumer profile of NIST’s Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for the consumer IoT sector (i.e., IoT products for home…

Learn More
Establishing a Zero Trust Model in IoT Environments

Establishing a Zero Trust Model in IoT Environments

In February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…

Learn More
A Zero Trust Approach to Securing Your IoT Devices

A Zero Trust Approach to Securing Your IoT Devices

Digital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…

Learn More
Federal Technology Vision 2022 – Government Enters the Metaverse

Federal Technology Vision 2022 – Government Enters...

This study examines the four building blocks of the metaverse continuum, with analysis from experts and survey data from over 200 government executives. The “Metaverse Continuum” is where many emergent…

Learn More
Critical Infrastructure: Actions Needed to Better Secure Internet-Connected Devices

Critical Infrastructure: Actions Needed to Better...

Cyber threats to critical infrastructure IoT (Internet of Things) and OT (operational technology) represent a significant national security challenge. Recent incidents–such as the ransomware attacks targeting health care and essential…

Learn More
Big Tech in Financial Services

Big Tech in Financial Services

This report provides a broad overview of the business models that define Big Tech, including a review of the motivations and environment that surround Big Tech’s operations in finance, with…

Learn More
Digital Twin Cities: Framework and Global Practices

Digital Twin Cities: Framework and Global Practices

The digital twin city is a new concept; it offers a model of urban planning and construction for future sustainable development that effectively combines innovations in digital technology with urban…

Learn More
Cybersecurity and Physical Security Convergence

Cybersecurity and Physical Security Convergence

Today’s threats are a result of hybrid attacks targeting both physical and cyber assets. The adoption and integration of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices…

Learn More
Global Mobile Trends 2023 Navigating an uncertain world

Global Mobile Trends 2023 Navigating an uncertain...

Much has changed since our first publication of Global Mobile Trends in 2016. Technology has advanced, companies have come and gone, and a pandemic has affected everyone. As ever, the…

Learn More
Zero Trust OT Security for Government & Critical Infrastructure

Zero Trust OT Security for Government & Critical...

IoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…

Learn More
2022 Cybersecurity & Privacy Annual Report

2022 Cybersecurity & Privacy Annual Report

During Fiscal Year 2022 (FY 2022) – from October 1, 2021, through September 30, 2022 –the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) Cybersecurity and Privacy…

Learn More
SD-WAN for Manufacturing

SD-WAN for Manufacturing

This paper examines six use cases in the manufacturing industry that show how the implementation of an advanced SD-WAN solution helps manufacturers accelerate their digital transformation journey and become a…

Learn More
The Promise of TradeTech: Policy Approaches to Harness Trade Digitalization

The Promise of TradeTech: Policy Approaches to...

This publication identifies the building blocks for TradeTech policy adoption: the 5 Gs of TradeTech. Trade agreements and pluri-lateral initiatives are exploring the interplay between technology and trade and can…

Learn More
Implementing a Zero Trust Architecture NCCoE

Implementing a Zero Trust Architecture NCCoE

In this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…

Learn More