GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

Ten Considerations for a Cloud Procurement

Cloud procurement presents an opportunity to reevaluate existing procurement strategies so you can create a flexible acquisition process that enables your public sector organization to extract the full benefits of…

Learn More

Security Best Practices for Manufacturing OT

New developments in cloud, Internet of Things (IoT), and edge computing have opened the door for traditionally on-premises manufacturing operations technology (OT) workloads to evolve into hybrid workloads. This whitepaper…

Learn More

Law Enforcement and Technology: The “Lawful...

Technological advances present both opportunities and challenges for U.S. law enforcement. For example, some developments have increased the quantity and availability of digital content and information for investigators and analysts.…

Learn More

Leverage the Insurance Industry to Drive...

Because foreign policy is climate policy, climate change is poised to upend the 21st century world order. To chart a new course forward, the Wilson Center and adelphi invited a…

Learn More

ICE Can Further Enhance Its Planning and Oversight...

Within the Department of Homeland Security, U.S. Immigration and Customs Enforcement met its goal to expand the 287(g) program. However, ICE has not established performance goals that cover all program…

Learn More

Strategic Intelligence Assessment and Data on...

Preventing terrorist attacks remains a top priority for both the FBI and the Department of Homeland Security (DHS). The threat posed by international and domestic threat actors has evolved significantly…

Learn More

Telehouse America: Unification Takes Data Center...

Security has always been mission-critical for Telehouse. The security team has consistently monitored video surveillance and access control systems 24/7 at each site to ensure customer data remains fully secured…

Learn More

Assessment of the Department of Homeland...

GAO found the information in Fiscal Year 2019-2020 Border Security Improvement Plan to be incomplete when compared to the elements required by the DHS Appropriations Act, 2018, as referenced by…

Learn More

Security and Congestion Modeling and Resilience...

New transformative technologies and novel architectures being developed by standards bodies (including the fifth generation (5G) wireless networks) are extremely complex. The benefits of 5G are made possible by virtualization,…

Learn More

Issues to Watch in Arms Control, Nonproliferation,...

U.S. Under Secretary for Arms Control and International Security, Christopher Ford, outlines seven “issues to watch” in the arms control, nonproliferation, and disarmament arena: 1. “No first use” or “sole…

Learn More

Understanding Russia’s Interest in Conflict Zones

Russia’s involvement in less-developed, fragile, and conflict-ridden countries has grown over the last several years and raises questions about the Kremlin’s interests, motives, and intentions. For the first decade or…

Learn More

TSA Needs to Improve Monitoring of the Deployed...

The Transportation Security Administration (TSA) does not monitor the Advanced Imaging Technology system (AIT) to ensure it continues to fulfill needed capabilities for detecting non-metallic threat items concealed on air…

Learn More

A Survey of Russia: Security Topics for 2020 and...

Although US security concerns have recently focused to a large degree on China, it is Russia that is the unpredictable wildcard. The country has stumbled in more ways than one…

Learn More

Strategic Stability and the Global Race for...

This edition of the ACIS Papers series looks at the challenges involved in preserving strategic stability in a modern environment of technology-fueled great power competition, arguing the importance of meeting…

Learn More

How to Engage the Enemy: The Case for National...

For decades, US policy has worked to isolate North Korea from the international community as well as from the United States itself. North Korea threatens US allies in the region…

Learn More