GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

Hardware-Enabled Security: Container Platform Security Prototype

Hardware-Enabled Security: Container Platform...

In today’s cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of…

Learn More
Security Primer – Ryuk

Security Primer – Ryuk

Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number one reported variant of 2019, accounting for approximately a…

Learn More
Extending a Security Team through Security Information & Event Management (SIEM)

Extending a Security Team through Security...

Companies and organizations around the globe are struggling to keep up with the demands of trying to stay afloat in a sea of security incidents while still actively hunting for…

Learn More
Assessment of the Department of Homeland Security’s Border Security Improvement Plan

Assessment of the Department of Homeland...

GAO found the information in Fiscal Year 2019-2020 Border Security Improvement Plan to be incomplete when compared to the elements required by the DHS Appropriations Act, 2018, as referenced by…

Learn More
Biometric Technologies and Global Security

Biometric Technologies and Global Security

Biometric technologies use unique biological or behavioral attributes—such as DNA, fingerprints, cardiac signatures, voice or gait patterns, and facial or ocular measurements— to authenticate an individual’s identity. Although biometric technologies…

Learn More
Akamai Edge Security Solutions

Akamai Edge Security Solutions

Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to…

Learn More
Deep Fakes and National Security

Deep Fakes and National Security

“Deep fakes”—a term that first emerged in 2017 to describe realistic photo, audio, video, and other forgeries generated with artificial intelligence (AI) technologies—could present a variety of national security challenges…

Learn More
Defense Primer: Security Cooperation

Defense Primer: Security Cooperation

The Department of Defense (DOD) uses the term security cooperation (SC) to refer broadly to DOD interactions with foreign security establishments. SC activities include: *transferring defense articles and services, *military-to-military…

Learn More
An Overview of the Mobile Security Ecosystem

An Overview of the Mobile Security Ecosystem

The Federal CIO Council established the Federal Mobility Group (FMG) and tasked it with improving cybersecurity, governance, and accountability for federal mobile device usage and programs. This paper describes the…

Learn More
How to Succeed in IoT Security

How to Succeed in IoT Security

Syber Networks, a Las Vegas-based managed solutions provider, has long preached the need to protect data on any device, including personal devices that access company information. But one construction customer…

Learn More
National Security Space Launch

National Security Space Launch

The United States is making significant efforts to pursue a strategy that ensures continued access to space for national security missions. The current strategy is embodied in the National Security…

Learn More
Enabling Automation In Security Operations

Enabling Automation In Security Operations

Many manual processes unknowingly rely on the operator or analyst to infer some fact from available information. This fact is often a key consideration for making an operational decision. While…

Learn More
Security Considerations for the 5G Era

Security Considerations for the 5G Era

5G is an evolving technology that will usher in an age of accelerated innovation connecting people, things and machines, through continuing improvements in mobile wireless communications. This 5G Americas whitepaper…

Learn More
Managed Security Service for Government

Managed Security Service for Government

The cyber threats targeting government networks are constantly evolving. This means agencies need to continually adapt to avoid bad actors gaining access to their networks to steal sensitive data or…

Learn More
Social Security, Deficits, and Debt

Social Security, Deficits, and Debt

Social Security is a self-financing program that covers an estimated 178 million workers and will provide monthly benefits to about 64 million beneficiaries in 2020. The Social Security program is…

Learn More