This paper builds upon prior 5G Americas publications addressing 5G security by providing considerations for securing 5G in Private, Public, and Hybrid cloud deployment models. Topics such as orchestration, automation,…
Learn MoreIn today’s cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of…
Learn MoreThe pandemic has created a technological revolution driving businesses to the cloud and evolving IT policies to support globally distributed and remote workforces. The threat has capitalized on this growth…
Learn MoreThe 2022 National Defense Strategy (NDS) lays out the Department’s strategy for the coming decade, from assisting in protecting the American people to promoting global security, seizing new strategic opportunities,…
Learn MoreThe National Security Strategy outlines how the Biden Administration will seize this decisive decade to advance America’s vital interests, position the United States to outmaneuver our geopolitical competitors, tackle shared…
Learn MoreChallenges to Security in Space was first published in early 2019 to address the main threats to the array of U.S. space capabilities, as well as to investigate space and…
Learn MoreThe Defense Intelligence Agency published “Challenges to Security in Space” an updated edition of a report first released in 2019. The findings are aimed at communicating the rapidly evolving threat…
Learn MorePresident Biden’s Executive Order #14028, Improving the Nation’s Cybersecurity, directed government agencies to strengthen their security posture against an ever-increasing number of cyber threats, and cited Zero Trust as the…
Learn MoreMany manual processes unknowingly rely on the operator or analyst to infer some fact from available information. This fact is often a key consideration for making an operational decision. While…
Learn MoreToday, more than ever, America’s fate is inextricably linked to events beyond our shores. We confront a global pandemic, a crushing economic downturn, a crisis of racial justice, and a…
Learn MoreIn response to Executive Order 13767, U.S. Customs and Border Protection (CBP) has implemented an array of new tools and technologies that have enhanced Border Patrol’s surveillance capabilities and efficiency…
Learn MoreThe problems of corporate concentration and privacy on the Internet are inextricably linked. A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more…
Learn MoreGAO found the information in Fiscal Year 2019-2020 Border Security Improvement Plan to be incomplete when compared to the elements required by the DHS Appropriations Act, 2018, as referenced by…
Learn MoreThe Cybersecurity and Infrastructure Security Convergence study addresses the threat generated by interconnected cyber-physical systems and its influence on an organization’s cybersecurity and physical security activities. This paper also includes guidance…
Learn MoreBiometric technologies use unique biological or behavioral attributes—such as DNA, fingerprints, cardiac signatures, voice or gait patterns, and facial or ocular measurements— to authenticate an individual’s identity. Although biometric technologies…
Learn More