GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IoT Content

IoT for the Public Sector: Moving from Risk to Reward

IoT for the Public Sector: Moving from Risk to...

The public sector is increasingly turning to IoT to enhance mission outcomes—from streamlining city traffic to improving classroom safety and enabling remote healthcare in rural areas. But with over 30%…

Learn More
Why the United States and EU Should Seize the Moment to Cooperate on Cybersecurity Labeling for IoT Devices

Why the United States and EU Should Seize the...

The United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…

Learn More
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations

People’s Republic of China-Linked Actors...

The Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…

Learn More
Executive Order 14306: Sustaining Select Efforts To Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144

Executive Order 14306: Sustaining Select Efforts...

Executive Order 14306 reinforces America’s cybersecurity defenses amid escalating threats from foreign adversaries like China, Russia, and North Korea. It expands efforts around secure software development, quantum-resistant encryption, and AI-powered…

Learn More
Empowering Your Zero Trust Strategy in the Federal Government

Empowering Your Zero Trust Strategy in the Federal...

As cyber threats grow in complexity, federal agencies are rethinking their security frameworks with a Zero Trust mindset—one that assumes no user, device, or network can be inherently trusted. This…

Learn More
Preserve Your Long-Term Records in Microsoft 365

Preserve Your Long-Term Records in Microsoft 365

Digital records stored in Microsoft 365 face a silent threat — over time, file formats change, systems evolve, and crucial information risks becoming unreadable. Preserve365® bridges this gap, ensuring records…

Learn More
The Evolution of RBAC to ABAC

The Evolution of RBAC to ABAC

The complexities of today’s IT landscape—think cloud apps, data silos, mobile, IoT, and Big Data—have exposed the limitations of role-based access control (RBAC) solutions, leaving organizations, federal government, and military…

Learn More
Clear the Road for Connected Operations: How Government Agencies Can Implement Efficiency-Driving Digital Solutions

Clear the Road for Connected Operations: How...

In today’s fast-paced world, connected operations are revolutionizing how public and private fleets manage efficiency, safety, and sustainability. This transformation is fueled by real-time data from IoT devices, helping teams…

Learn More
Implementing a Zero Trust Architecture NCCoE

Implementing a Zero Trust Architecture NCCoE

In this technical white paper, the importance of implementing Zero Trust Architecture is discussed. The growth in cloud computing, Internet of Things (IoT), business partnerships, and remote work has increased…

Learn More
Safeguarding Military Infrastructure and Frameworks: Opportunities and Challenges | Northeast

Safeguarding Military Infrastructure and...

The digital battlefield is evolving rapidly, with adversaries leveraging new tactics to exploit expanding attack surfaces. From hidden domains to IoT vulnerabilities, securing military infrastructure demands a shift from traditional…

Learn More
Empowering Real-Time Geospatial Intelligence with Samsara and Esri

Empowering Real-Time Geospatial Intelligence with...

Samsara and Esri have joined forces to deliver real-time geospatial intelligence by integrating Samsara’s IoT data with Esri’s advanced GIS analytics. This powerful combination helps government agencies and organizations optimize…

Learn More
Three Key Technology Advancements Enabling Law Enforcement Modernization

Three Key Technology Advancements Enabling Law...

Much like every other aspect of our lives, law enforcement is now a digitally driven activity. Every crime has digital evidence, whether it’s a suspect’s cell phone, a witness’s cell…

Learn More
Global Community Technology Challenge (GCTC) Strategic Plan 2024-2026

Global Community Technology Challenge (GCTC)...

This document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division of the Communications…

Learn More
Malware on the Move: Rethinking Threat  Analysis in the Age of AI and Adversarial  Innovation

Malware on the Move: Rethinking Threat Analysis...

This white paper outlines the growing cyber risks facing national infrastructure due to outdated systems, slow modernization, and fragmented defenses. It identifies how policy gaps and underinvestment are weakening our…

Learn More
Consumer Safety Tips for Lithium-Ion Battery-Powered Micromobility Devices

Consumer Safety Tips for Lithium-Ion...

Did you know the lithium-ion batteries powering e-bikes and scooters are considered hazardous materials? These batteries store a lot of energy and, if not properly maintained, can pose fire risks…

Learn More