GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity content

Standardization of Remote Ballot Marking & Return...

The 2020 election cycle is creating a challenge impacting all who are interested in, concerned about, and enabled by our electoral system. Citizens, republican and democratic state election officials, states…

Learn More

Election Infrastructure Subsector-Specific Plan

The GCC and SCC jointly crafted this version of the Election Infrastructure Subsector-Specific Plan to reflect the continued growth of the Subsector and the significant progress made since the 2018…

Learn More

Managing Cryptographic and Quantum Risk

Today’s agencies and organizations rely on cryptography to an extent that few people realize. Even CIOs and CISOs typically don’t give much thought to cryptography, and when they do it’s…

Learn More

SentinelOne For Public Sector

As a government and a public sector organization, you face varied and complex challenges. You deliver multiple and wide-ranging services to diverse communities and you do it, often constrained by…

Learn More

Zero Trust Privilege For Dummies

Cyber breaches are bigger and worse than ever. Hardly a day goes by without headlines about some new devastating cyber-attack. To better protect against data breaches, the use of a…

Learn More

Advancing Cybersecurity at Scale in the Cloud

Cyber attacks in the public sector are on the rise. According to a July 2019 report by a Senate homeland security subcommittee, the number of cyberattacks reported by federal agencies…

Learn More

Phishing Activity Trends Report

The APWG Phishing Activity Trends Report analyzes phishing attacks and other identity theft techniques, as reported to the APWG by its member companies, its Global Research Partners, through the organization’s…

Learn More

FY2021 Federal Cybersecurity R&D Strategic Plan...

This document provides FY2021 implementation plans for the 2019 Federal Cybersecurity Research and Development Strategic Plan (Plan), developed by the Networking and Information Technology Research and Development (NITRD) Program’s Cyber…

Learn More

Resource Guide for Cybersecurity During the...

The The Multi-State Information Sharing and Analysis Center (MS-ISAC) and Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) Security Operations Center (SOC) is also seeing an increase in specific types…

Learn More

Modernizing Cloud and Internet Access with...

With federal cloud adoption at an all-time high and growing with IT modernization, federal teams need secure 24/7/365 access to data and applications anywhere, from any device. For years, the…

Learn More

Using Okta to Protect IL4 Data

Okta is the industry leader in identity and access management, enabling organizations to accelerate the secure adoption of their web-based applications, both in the cloud and on premises. Okta delivers…

Learn More

SAP NS2 Powers the Intelligent Enterprise

SAP NS2 has invested millions of dollars to ensure the security of its solutions, so customers can have access to leading cloud technologies while being guaranteed that their SAP solutions…

Learn More

Managing Compliance in the Cloud

When it comes to your data, it all starts with trust. If you ask security, compliance, and IT professionals what keeps them up at night, the most common response is…

Learn More

Keeping Systems Secure While Working from Home

Endpoint and workspace management is not only crucial for enterprise cybersecurity but is often required by government entities and contractors to protect critical cyber infrastructure. Unpatched, unidentified or unknown computing…

Learn More

Everything You Need. All in the Cloud.

Cybersecurity and CX present a balancing act for agencies. Although both concerns are important, these organizations are often short on budget dollars and time. Fortunately, cloud vendors can help agencies…

Learn More