GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Risk Management / Regulatory content

Malicious Cyber Actors Use Buffer Overflow Vulnerabilities to Compromise Software

Malicious Cyber Actors Use Buffer Overflow...

Cyber threats are evolving, but one vulnerability remains stubbornly persistent—buffer overflows. Despite decades of known solutions, many software manufacturers continue to develop products with these security flaws, putting users at…

Learn More
Disaster Contracting: Opportunities Exist for FEMA to Improve Oversight

Disaster Contracting: Opportunities Exist for FEMA...

FEMA plays a crucial role in disaster response, but recent reviews have highlighted gaps in contract oversight that could impact efficiency and accountability. With over $10 billion obligated for disaster-related…

Learn More
Interagency Security Committee Compliance Policy and Compliance Benchmarks

Interagency Security Committee Compliance Policy...

In an era of evolving threats, the 2024 ISC Compliance Policy and Benchmarks provide a clear framework for securing federal facilities. This guide helps agencies assess their adherence to critical…

Learn More
Supervisory Highlights: Advanced Technologies Special Edition

Supervisory Highlights: Advanced Technologies...

The rapid adoption of AI and machine learning in financial decision-making comes with both opportunities and risks. A recent CFPB report highlights how advanced credit scoring models, used by lenders,…

Learn More
Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

Threat Actors Chained Vulnerabilities in Ivanti...

Cyber threats continue to evolve, and the latest attacks on Ivanti Cloud Service Applications highlight just how determined adversaries are. By chaining multiple vulnerabilities, threat actors were able to bypass…

Learn More
Microsoft Expanded Cloud Logs Implementation Playbook

Microsoft Expanded Cloud Logs Implementation...

Cyber threats are evolving, and the ability to detect and respond to them quickly has never been more critical. The Microsoft Expanded Cloud Logs Implementation Playbook empowers organizations to enhance…

Learn More
Food Safety: FDA Should Strengthen Inspection Efforts to Protect the U.S. Food Supply

Food Safety: FDA Should Strengthen Inspection...

The Food and Drug Administration (FDA) plays a critical role in safeguarding the U.S. food supply, but challenges persist in meeting inspection targets. Despite handling approximately 80% of the nation’s…

Learn More
Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products

Secure by Demand: Priority Considerations for...

Operational technology (OT) systems are the backbone of critical infrastructure, from energy and water to transportation. However, with their increasing interconnectivity, they’ve become prime targets for cyberattacks. To mitigate these…

Learn More
Infrastructure Resilience and Security: Explosive Threat Mitigation Unit

Infrastructure Resilience and Security: Explosive...

Traditional steel containment boxes for explosive threats are often too bulky for quick deployment, slowing response times in critical situations. The Threat Mitigation Unit (TMU) changes the game, offering a…

Learn More
People Disruption Risk!

People Disruption Risk!

The past year has underscored the critical importance of managing risks effectively, from the frailties of human behavior during turbulent elections to the devastating economic toll of natural disasters. Organizations…

Learn More
Internet-Exposed HMIs Pose Cybersecurity Risks to Water and Wastewater Systems

Internet-Exposed HMIs Pose Cybersecurity Risks to...

Cybersecurity vulnerabilities in water and wastewater systems can pose serious risks, as internet-exposed Human Machine Interfaces make critical infrastructure vulnerable to unauthorized access. Recent incidents show how malicious actors can…

Learn More
Contingency Plan for Shutdown of Agency Operations in the Absence of Appropriations

Contingency Plan for Shutdown of Agency Operations...

The U.S. Trade Representative’s Shutdown Contingency Plan ensures that critical trade functions continue even during a lapse in federal appropriations. Priorities include managing World Trade Organization disputes, enforcing key trade…

Learn More
Cybersecuring Facility-Related Control Systems

Cybersecuring Facility-Related Control Systems

Federal facilities are increasingly relying on control systems to enhance efficiency, optimize operations, and integrate renewable energy—but this connectivity comes with cybersecurity risks. The Federal Energy Management Program (FEMP) offers…

Learn More
Intellectual Property: Information on Third-Party Funding of Patent Litigation

Intellectual Property: Information on Third-Party...

Patent litigation is increasingly shaped by third-party funding, providing resource-constrained inventors and organizations the ability to pursue cases. While this funding expands access to justice, it also raises questions about…

Learn More
NIST Cybersecurity Framework 2.0: Quick-Start Guide for Cybersecurity Supply Chain Risk Management

NIST Cybersecurity Framework 2.0: Quick-Start...

NIST’s Cybersecurity Framework 2.0 provides a roadmap for managing cybersecurity risks across complex supply chains. The framework emphasizes collaboration among stakeholders to address threats like malicious software, counterfeit devices, and…

Learn More