GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

Security for 5G

Security for 5G

This paper builds upon prior 5G Americas publications addressing 5G security by providing considerations for securing 5G in Private, Public, and Hybrid cloud deployment models. Topics such as orchestration, automation,…

Learn More
Hardware-Enabled Security: Container Platform Security Prototype

Hardware-Enabled Security: Container Platform...

In today’s cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of…

Learn More
Modernizing Security Operations

Modernizing Security Operations

The pandemic has created a technological revolution driving businesses to the cloud and evolving IT policies to support globally distributed and remote workforces. The threat has capitalized on this growth…

Learn More
Challenges to Security in Space

Challenges to Security in Space

Challenges to Security in Space was first published in early 2019 to address the main threats to the array of U.S. space capabilities, as well as to investigate space and…

Learn More
Challenges to Security in Space

Challenges to Security in Space

The Defense Intelligence Agency published “Challenges to Security in Space” an updated edition of a report first released in 2019. The findings are aimed at communicating the rapidly evolving threat…

Learn More
Assessment of the Department of Homeland Security’s Border Security Improvement Plan

Assessment of the Department of Homeland...

GAO found the information in Fiscal Year 2019-2020 Border Security Improvement Plan to be incomplete when compared to the elements required by the DHS Appropriations Act, 2018, as referenced by…

Learn More
Overcoming Identity Challenges to Meet the Federal Government’s Zero Trust Memo

Overcoming Identity Challenges to Meet the Federal...

President Biden’s Executive Order #14028, Improving the Nation’s Cybersecurity, directed government agencies to strengthen their security posture against an ever-increasing number of cyber threats, and cited Zero Trust as the…

Learn More
Enabling Automation In Security Operations

Enabling Automation In Security Operations

Many manual processes unknowingly rely on the operator or analyst to infer some fact from available information. This fact is often a key consideration for making an operational decision. While…

Learn More
Harnessing a Network of Laboratories to Meet Tomorrow’s Homeland Security Challenges

Harnessing a Network of Laboratories to Meet...

ONL embraces its centralized role with all laboratories that provide developmental assistance for products and solutions to support the homeland security community and keep our country safe. ONL is arranged…

Learn More
Interim National Security Strategic Guidance

Interim National Security Strategic Guidance

Today, more than ever, America’s fate is inextricably linked to events beyond our shores. We confront a global pandemic, a crushing economic downturn, a crisis of racial justice, and a…

Learn More
CBP Has Improved Southwest Border Technology, but Significant Challenges Remain

CBP Has Improved Southwest Border Technology, but...

In response to Executive Order 13767, U.S. Customs and Border Protection (CBP) has implemented an array of new tools and technologies that have enhanced Border Patrol’s surveillance capabilities and efficiency…

Learn More
Four Years of Innovation and Continuity in U.S. Policy: Arms Control and International Security Since January 2017

Four Years of Innovation and Continuity in U.S....

In this ACIS Paper, Assistant Secretary Ford looks across the policy arenas covered by the State Department’s “T” family of bureaus to provide a survey and summary of policy development…

Learn More
Privacy Without Monopoly: Data Protection and Interoperability

Privacy Without Monopoly: Data Protection and...

The problems of corporate concentration and privacy on the Internet are inextricably linked. A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more…

Learn More
Cybersecurity and Physical Security Convergence

Cybersecurity and Physical Security Convergence

The Cybersecurity and Infrastructure Security Convergence study addresses the threat generated by interconnected cyber-physical systems and its influence on an organization’s cybersecurity and physical security activities. This paper also includes guidance…

Learn More
Biometric Technologies and Global Security

Biometric Technologies and Global Security

Biometric technologies use unique biological or behavioral attributes—such as DNA, fingerprints, cardiac signatures, voice or gait patterns, and facial or ocular measurements— to authenticate an individual’s identity. Although biometric technologies…

Learn More