This paper builds upon prior 5G Americas publications addressing 5G security by providing considerations for securing 5G in Private, Public, and Hybrid cloud deployment models. Topics such as orchestration, automation,…
Learn MoreIn today’s cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of…
Learn MoreThe pandemic has created a technological revolution driving businesses to the cloud and evolving IT policies to support globally distributed and remote workforces. The threat has capitalized on this growth…
Learn MoreNearly all networked devices use the Internet Protocol (IP) for their communications. IP version 6 (IPv6) is the current version of IP and provides advantages over the legacy IP version…
Learn MoreThe 2022 National Defense Strategy (NDS) lays out the Department’s strategy for the coming decade, from assisting in protecting the American people to promoting global security, seizing new strategic opportunities,…
Learn MoreThe National Security Strategy outlines how the Biden Administration will seize this decisive decade to advance America’s vital interests, position the United States to outmaneuver our geopolitical competitors, tackle shared…
Learn MoreChallenges to Security in Space was first published in early 2019 to address the main threats to the array of U.S. space capabilities, as well as to investigate space and…
Learn MoreThe Defense Intelligence Agency published “Challenges to Security in Space” an updated edition of a report first released in 2019. The findings are aimed at communicating the rapidly evolving threat…
Learn MoreGAO found the information in Fiscal Year 2019-2020 Border Security Improvement Plan to be incomplete when compared to the elements required by the DHS Appropriations Act, 2018, as referenced by…
Learn MorePresident Biden’s Executive Order #14028, Improving the Nation’s Cybersecurity, directed government agencies to strengthen their security posture against an ever-increasing number of cyber threats, and cited Zero Trust as the…
Learn MoreMany manual processes unknowingly rely on the operator or analyst to infer some fact from available information. This fact is often a key consideration for making an operational decision. While…
Learn MoreToday’s threats are a result of hybrid attacks targeting both physical and cyber assets. The adoption and integration of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices…
Learn MoreEstablished in early 2003, the Department of Homeland Security (DHS) is the “youngest” cabinet-level department of the U.S. government and has a broad and complex mission. This report is intended…
Learn MoreIn advance of Russia’s attack on Ukraine, the Biden Administration and the 117th Congress had boosted security assistance to Ukraine and continue to consider further options. Since Russia launched its…
Learn MoreThis report from National Security Agency presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their…
Learn More