GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IoT Content

Profile of the IoT Core Baseline for Consumer IoT Products

Profile of the IoT Core Baseline for Consumer IoT...

This publication documents the consumer profile of NIST’s Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for the consumer IoT sector (i.e., IoT products for home…

Learn More
Establishing a Zero Trust Model in IoT Environments

Establishing a Zero Trust Model in IoT Environments

In February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…

Learn More
A Zero Trust Approach to Securing Your IoT Devices

A Zero Trust Approach to Securing Your IoT Devices

Digital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…

Learn More
Why the United States and EU Should Seize the Moment to Cooperate on Cybersecurity Labeling for IoT Devices

Why the United States and EU Should Seize the...

The United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…

Learn More
Federal Technology Vision 2022 – Government Enters the Metaverse

Federal Technology Vision 2022 – Government Enters...

This study examines the four building blocks of the metaverse continuum, with analysis from experts and survey data from over 200 government executives. The “Metaverse Continuum” is where many emergent…

Learn More
Critical Infrastructure: Actions Needed to Better Secure Internet-Connected Devices

Critical Infrastructure: Actions Needed to Better...

Cyber threats to critical infrastructure IoT (Internet of Things) and OT (operational technology) represent a significant national security challenge. Recent incidents–such as the ransomware attacks targeting health care and essential…

Learn More
Big Tech in Financial Services

Big Tech in Financial Services

This report provides a broad overview of the business models that define Big Tech, including a review of the motivations and environment that surround Big Tech’s operations in finance, with…

Learn More
Global Mobile Trends 2023 Navigating an uncertain world

Global Mobile Trends 2023 Navigating an uncertain...

Much has changed since our first publication of Global Mobile Trends in 2016. Technology has advanced, companies have come and gone, and a pandemic has affected everyone. As ever, the…

Learn More
Zero Trust OT Security for Government & Critical Infrastructure

Zero Trust OT Security for Government & Critical...

IoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…

Learn More
Cybersecurity and Physical Security Convergence

Cybersecurity and Physical Security Convergence

Today’s threats are a result of hybrid attacks targeting both physical and cyber assets. The adoption and integration of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices…

Learn More
2022 Cybersecurity & Privacy Annual Report

2022 Cybersecurity & Privacy Annual Report

During Fiscal Year 2022 (FY 2022) – from October 1, 2021, through September 30, 2022 –the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) Cybersecurity and Privacy…

Learn More
SD-WAN for Manufacturing

SD-WAN for Manufacturing

This paper examines six use cases in the manufacturing industry that show how the implementation of an advanced SD-WAN solution helps manufacturers accelerate their digital transformation journey and become a…

Learn More
Implementing a Zero Trust Architecture NCCoE

Implementing a Zero Trust Architecture NCCoE

In this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…

Learn More
Blockchain for Access Control Systems

Blockchain for Access Control Systems

Access control (AC) is concerned with determining the allowed activities of legitimate users and mediating every attempt by a user to access a resource in the system. The objectives of…

Learn More
Three Key Technology Advancements Enabling Law Enforcement Modernization

Three Key Technology Advancements Enabling Law...

Much like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…

Learn More