The National Security Strategy outlines how the Biden Administration will seize this decisive decade to advance America’s vital interests, position the United States to outmaneuver our geopolitical competitors, tackle shared…
Learn MoreNearly all networked devices use the Internet Protocol (IP) for their communications. IP version 6 (IPv6) is the current version of IP and provides advantages over the legacy IP version…
Learn MoreThe U.S. has approximately 6,000 miles of land borders, 95,000 miles of coastline, and more than 300 ports of entry where travelers and cargo are inspected. Securing U.S. border areas…
Learn MorePresident Biden’s Executive Order #14028, Improving the Nation’s Cybersecurity, directed government agencies to strengthen their security posture against an ever-increasing number of cyber threats, and cited Zero Trust as the…
Learn MoreEstablished in early 2003, the Department of Homeland Security (DHS) is the “youngest” cabinet-level department of the U.S. government and has a broad and complex mission. This report is intended…
Learn MoreNon-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for…
Learn MoreToday’s threats are a result of hybrid attacks targeting both physical and cyber assets. The adoption and integration of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices…
Learn MoreGovernment Accountability Office (GAO) was asked to review U.S. efforts to secure international nuclear materials. This report describes the risks to securing international nuclear materials identified by federal officials and…
Learn More“Deep fakes”—a term that first emerged in 2017 to describe realistic photo, audio, video, and other forgeries generated with artificial intelligence (AI) technologies—could present a variety of national security challenges…
Learn MoreDisasters are resulting in unprecedented levels of destruction across the world. These shocks and disruptions affect the functioning and sustainability of agricultural production and threaten the livelihoods of millions of…
Learn MoreGovernment agencies support critical missions and must ensure the highest security standards in their cloud environment. However, as agencies move to the cloud, they often face a lack of visibility…
Learn More“Cloud Security Technical Reference Architecture” outlines recommended approaches to cloud migration and data protection for agency data collection and reporting that leverage Cloud Security Posture Management (CSPM). This technical reference…
Learn MoreAs the government rapidly adopts cloud technologies, the number of potential attack targets across various cloud environments and architectural frameworks are increasing. Increasing visibility into the entire cloud ecosystem is…
Learn MoreManufacturers are increasingly targeted in cyber-attacks. Small manufacturers are particularly vulnerable due to limitations in staff and resources to operate facilities and manage cybersecurity. Security segmentation is a cost-effective and…
Learn MoreThis annual White Paper marks our 14th year of reporting on the status and direction of the U.S. Contract Security Market. Although the topic headlines remain relatively unchanged from year…
Learn More