In February of 2023, a United States healthcare provider disclosed that malicious actors breached their network, exfiltrated clinical images and protected health information (PHI) about cancer patients, then published it…
Learn MoreThe public sector is increasingly turning to IoT to enhance mission outcomes—from streamlining city traffic to improving classroom safety and enabling remote healthcare in rural areas. But with over 30%…
Learn MoreDigital transformation is happening all around us especially in the government space, in our cities and towns, at our state levels and even at the federal level. Now, everything is…
Learn MoreThe United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…
Learn MoreThe Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…
Learn MoreExecutive Order 14306 reinforces America’s cybersecurity defenses amid escalating threats from foreign adversaries like China, Russia, and North Korea. It expands efforts around secure software development, quantum-resistant encryption, and AI-powered…
Learn MoreIoT and OT security is a very exciting development at Palo Alto Networks. Now, there is significantly more connectivity, digital transformation, and cloud-based use cases in the space on IT…
Learn MoreThe complexities of today’s IT landscape—think cloud apps, data silos, mobile, IoT, and Big Data—have exposed the limitations of role-based access control (RBAC) solutions, leaving organizations, federal government, and military…
Learn MoreIn today’s fast-paced world, connected operations are revolutionizing how public and private fleets manage efficiency, safety, and sustainability. This transformation is fueled by real-time data from IoT devices, helping teams…
Learn MoreIn this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…
Learn MoreThe digital battlefield is evolving rapidly, with adversaries leveraging new tactics to exploit expanding attack surfaces. From hidden domains to IoT vulnerabilities, securing military infrastructure demands a shift from traditional…
Learn MoreSamsara and Esri have joined forces to deliver real-time geospatial intelligence by integrating Samsara’s IoT data with Esri’s advanced GIS analytics. This powerful combination helps government agencies and organizations optimize…
Learn MoreMuch like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…
Learn MoreThis document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division of the Communications…
Learn MoreThis white paper outlines the growing cyber risks facing national infrastructure due to outdated systems, slow modernization, and fragmented defenses. It identifies how policy gaps and underinvestment are weakening our…
Learn More