GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

National Security Strategy

National Security Strategy

The National Security Strategy outlines how the Biden Administration will seize this decisive decade to advance America’s vital interests, position the United States to outmaneuver our geopolitical competitors, tackle shared…

Learn More
IPv6 Security Guidance

IPv6 Security Guidance

Nearly all networked devices use the Internet Protocol (IP) for their communications. IP version 6 (IPv6) is the current version of IP and provides advantages over the legacy IP version…

Learn More
Department of Homeland Security: Reporting on Border Security Metrics Could Be Improved

Department of Homeland Security: Reporting on...

The U.S. has approximately 6,000 miles of land borders, 95,000 miles of coastline, and more than 300 ports of entry where travelers and cargo are inspected. Securing U.S. border areas…

Learn More
Overcoming Identity Challenges to Meet the Federal Government’s Zero Trust Memo

Overcoming Identity Challenges to Meet the Federal...

President Biden’s Executive Order #14028, Improving the Nation’s Cybersecurity, directed government agencies to strengthen their security posture against an ever-increasing number of cyber threats, and cited Zero Trust as the…

Learn More
The Department of Homeland Security:  A Primer

The Department of Homeland Security: A Primer

Established in early 2003, the Department of Homeland Security (DHS) is the “youngest” cabinet-level department of the U.S. government and has a broad and complex mission. This report is intended…

Learn More
Non-Fungible Token Security

Non-Fungible Token Security

Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for…

Learn More
Cybersecurity and Physical Security Convergence

Cybersecurity and Physical Security Convergence

Today’s threats are a result of hybrid attacks targeting both physical and cyber assets. The adoption and integration of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices…

Learn More
Overseas Nuclear Material Security

Overseas Nuclear Material Security

Government Accountability Office (GAO) was asked to review U.S. efforts to secure international nuclear materials. This report describes the risks to securing international nuclear materials identified by federal officials and…

Learn More
Deep Fakes and National Security

Deep Fakes and National Security

“Deep fakes”—a term that first emerged in 2017 to describe realistic photo, audio, video, and other forgeries generated with artificial intelligence (AI) technologies—could present a variety of national security challenges…

Learn More
The Impact of Disasters on Agriculture and Food Security

The Impact of Disasters on Agriculture and Food...

Disasters are resulting in unprecedented levels of destruction across the world. These shocks and disruptions affect the functioning and sustainability of agricultural production and threaten the livelihoods of millions of…

Learn More
The Single Cloud Security Platform for Government

The Single Cloud Security Platform for Government

Government agencies support critical missions and must ensure the highest security standards in their cloud environment. However, as agencies move to the cloud, they often face a lack of visibility…

Learn More
Cloud Security Technical Reference Architecture

Cloud Security Technical Reference Architecture

“Cloud Security Technical Reference Architecture” outlines recommended approaches to cloud migration and data protection for agency data collection and reporting that leverage Cloud Security Posture Management (CSPM). This technical reference…

Learn More
Limiting Attacks with Cloud Visibility and Security

Limiting Attacks with Cloud Visibility and Security

As the government rapidly adopts cloud technologies, the number of potential attack targets across various cloud environments and architectural frameworks are increasing. Increasing visibility into the entire cloud ecosystem is…

Learn More
Security Segmentation in a Small Manufacturing Environment

Security Segmentation in a Small Manufacturing...

Manufacturers are increasingly targeted in cyber-attacks.  Small manufacturers are particularly vulnerable due to limitations in staff and resources to operate facilities and manage cybersecurity. Security segmentation is a cost-effective and…

Learn More
2022 U.S. Contract Security Market

2022 U.S. Contract Security Market

This annual White Paper marks our 14th year of reporting on the status and direction of the U.S. Contract Security Market. Although the topic headlines remain relatively unchanged from year…

Learn More