GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IoT Content

Establishing a Zero Trust Model in IoT Environments

Establishing a Zero Trust Model in IoT Environments

In February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…

Learn More
IoT for the Public Sector: Moving from Risk to Reward

IoT for the Public Sector: Moving from Risk to...

The public sector is increasingly turning to IoT to enhance mission outcomes—from streamlining city traffic to improving classroom safety and enabling remote healthcare in rural areas. But with over 30%…

Learn More
A Zero Trust Approach to Securing Your IoT Devices

A Zero Trust Approach to Securing Your IoT Devices

Digital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…

Learn More
Why the United States and EU Should Seize the Moment to Cooperate on Cybersecurity Labeling for IoT Devices

Why the United States and EU Should Seize the...

The United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…

Learn More
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations

People’s Republic of China-Linked Actors...

The Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…

Learn More
Executive Order 14306: Sustaining Select Efforts To Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144

Executive Order 14306: Sustaining Select Efforts...

Executive Order 14306 reinforces America’s cybersecurity defenses amid escalating threats from foreign adversaries like China, Russia, and North Korea. It expands efforts around secure software development, quantum-resistant encryption, and AI-powered…

Learn More
Zero Trust OT Security for Government & Critical Infrastructure

Zero Trust OT Security for Government & Critical...

IoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…

Learn More
The Evolution of RBAC to ABAC

The Evolution of RBAC to ABAC

The complexities of today’s IT landscape—think cloud apps, data silos, mobile, IoT, and Big Data—have exposed the limitations of role-based access control (RBAC) solutions, leaving organizations, federal government, and military…

Learn More
Clear the Road for Connected Operations: How Government Agencies Can Implement Efficiency-Driving Digital Solutions

Clear the Road for Connected Operations: How...

In today’s fast-paced world, connected operations are revolutionizing how public and private fleets manage efficiency, safety, and sustainability. This transformation is fueled by real-time data from IoT devices, helping teams…

Learn More
Implementing a Zero Trust Architecture NCCoE

Implementing a Zero Trust Architecture NCCoE

In this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…

Learn More
Safeguarding Military Infrastructure and Frameworks: Opportunities and Challenges | Northeast

Safeguarding Military Infrastructure and...

The digital battlefield is evolving rapidly, with adversaries leveraging new tactics to exploit expanding attack surfaces. From hidden domains to IoT vulnerabilities, securing military infrastructure demands a shift from traditional…

Learn More
Empowering Real-Time Geospatial Intelligence with Samsara and Esri

Empowering Real-Time Geospatial Intelligence with...

Samsara and Esri have joined forces to deliver real-time geospatial intelligence by integrating Samsara’s IoT data with Esri’s advanced GIS analytics. This powerful combination helps government agencies and organizations optimize…

Learn More
Three Key Technology Advancements Enabling Law Enforcement Modernization

Three Key Technology Advancements Enabling Law...

Much like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…

Learn More
Global Community Technology Challenge (GCTC) Strategic Plan 2024-2026

Global Community Technology Challenge (GCTC)...

This document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division of the Communications…

Learn More
Malware on the Move: Rethinking Threat  Analysis in the Age of AI and Adversarial  Innovation

Malware on the Move: Rethinking Threat Analysis...

This white paper outlines the growing cyber risks facing national infrastructure due to outdated systems, slow modernization, and fragmented defenses. It identifies how policy gaps and underinvestment are weakening our…

Learn More