GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

Security for 5G

Security for 5G

This paper builds upon prior 5G Americas publications addressing 5G security by providing considerations for securing 5G in Private, Public, and Hybrid cloud deployment models. Topics such as orchestration, automation,…

Learn More
Hardware-Enabled Security: Container Platform Security Prototype

Hardware-Enabled Security: Container Platform...

In today’s cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of…

Learn More
Modernizing Security Operations

Modernizing Security Operations

The pandemic has created a technological revolution driving businesses to the cloud and evolving IT policies to support globally distributed and remote workforces. The threat has capitalized on this growth…

Learn More
Overcoming Identity Challenges to Meet the Federal Government’s Zero Trust Memo

Overcoming Identity Challenges to Meet the Federal...

President Biden’s Executive Order #14028, Improving the Nation’s Cybersecurity, directed government agencies to strengthen their security posture against an ever-increasing number of cyber threats, and cited Zero Trust as the…

Learn More
Enabling Automation In Security Operations

Enabling Automation In Security Operations

Many manual processes unknowingly rely on the operator or analyst to infer some fact from available information. This fact is often a key consideration for making an operational decision. While…

Learn More
The “Quad”: Security Cooperation Among the United States, Japan, India, and Australia

The “Quad”: Security Cooperation Among the United...

In October 2020, in the midst of a global pandemic, U.S. Secretary of State Mike Pompeo and his three counterparts from Australia, India, and Japan convened an in-person meeting in…

Learn More
Physical Security for Cold Storage Locations

Physical Security for Cold Storage Locations

As America prepares for distribution of coronavirus vaccine, the security and integrity of facilities that will receive, house, and distribute COVID-19 vaccines has come into focus. Supply chain and cold…

Learn More
Harnessing a Network of Laboratories to Meet Tomorrow’s Homeland Security Challenges

Harnessing a Network of Laboratories to Meet...

ONL embraces its centralized role with all laboratories that provide developmental assistance for products and solutions to support the homeland security community and keep our country safe. ONL is arranged…

Learn More
Interim National Security Strategic Guidance

Interim National Security Strategic Guidance

Today, more than ever, America’s fate is inextricably linked to events beyond our shores. We confront a global pandemic, a crushing economic downturn, a crisis of racial justice, and a…

Learn More
CBP Has Improved Southwest Border Technology, but Significant Challenges Remain

CBP Has Improved Southwest Border Technology, but...

In response to Executive Order 13767, U.S. Customs and Border Protection (CBP) has implemented an array of new tools and technologies that have enhanced Border Patrol’s surveillance capabilities and efficiency…

Learn More
Four Years of Innovation and Continuity in U.S. Policy: Arms Control and International Security Since January 2017

Four Years of Innovation and Continuity in U.S....

In this ACIS Paper, Assistant Secretary Ford looks across the policy arenas covered by the State Department’s “T” family of bureaus to provide a survey and summary of policy development…

Learn More
Bridging the Gap: Strategies For Civic Engagement and Diplomacy In the Bering Strait Region

Bridging the Gap: Strategies For Civic Engagement...

The Bering Strait Region is becoming increasingly important in informing Arctic policy and regional governance. This report seeks to analyze the role of Indigenous Peoples in the policymaking process and…

Learn More
Privacy Without Monopoly: Data Protection and Interoperability

Privacy Without Monopoly: Data Protection and...

The problems of corporate concentration and privacy on the Internet are inextricably linked. A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more…

Learn More
Assessment of the Department of Homeland Security’s Border Security Improvement Plan

Assessment of the Department of Homeland...

GAO found the information in Fiscal Year 2019-2020 Border Security Improvement Plan to be incomplete when compared to the elements required by the DHS Appropriations Act, 2018, as referenced by…

Learn More
U.S. Security Assistance to Ukraine

U.S. Security Assistance to Ukraine

In advance of Russia’s attack on Ukraine, the Biden Administration and the 117th Congress had boosted security assistance to Ukraine and continue to consider further options. Since Russia launched its…

Learn More