GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

Unidirectional Security Gateways

Unidirectional Security Gateways

In a globally connected world, protecting national security is a difficult and complex task. Government and defense installations are all prime targets for cyber-sabotage and cyber-espionage attacks. Pulling relevant data…

Learn More
IPv6 Security Guidance

IPv6 Security Guidance

Nearly all networked devices use the Internet Protocol (IP) for their communications. IP version 6 (IPv6) is the current version of IP and provides advantages over the legacy IP version…

Learn More
Department of Homeland Security: Reporting on Border Security Metrics Could Be Improved

Department of Homeland Security: Reporting on...

The U.S. has approximately 6,000 miles of land borders, 95,000 miles of coastline, and more than 300 ports of entry where travelers and cargo are inspected. Securing U.S. border areas…

Learn More
Non-Fungible Token Security

Non-Fungible Token Security

Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for…

Learn More
Overseas Nuclear Material Security

Overseas Nuclear Material Security

Government Accountability Office (GAO) was asked to review U.S. efforts to secure international nuclear materials. This report describes the risks to securing international nuclear materials identified by federal officials and…

Learn More
Deep Fakes and National Security

Deep Fakes and National Security

“Deep fakes”—a term that first emerged in 2017 to describe realistic photo, audio, video, and other forgeries generated with artificial intelligence (AI) technologies—could present a variety of national security challenges…

Learn More
Product Security Bad Practices

Product Security Bad Practices

In the latest Secure by Design initiative, CISA emphasizes that software security must be a priority from the very start of development. This guidance outlines the most critical bad practices…

Learn More
Military Service and Social Security

Military Service and Social Security

Earnings for active duty military service or active duty training have been covered under Social Security since 1957. If you served in the military before 1957, you didn’t pay Social…

Learn More
The Department of Homeland Security:  A Primer

The Department of Homeland Security: A Primer

Established in early 2003, the Department of Homeland Security (DHS) is the “youngest” cabinet-level department of the U.S. government and has a broad and complex mission. This report is intended…

Learn More
The Single Cloud Security Platform for Government

The Single Cloud Security Platform for Government

Government agencies support critical missions and must ensure the highest security standards in their cloud environment. However, as agencies move to the cloud, they often face a lack of visibility…

Learn More
Limiting Attacks with Cloud Visibility and Security

Limiting Attacks with Cloud Visibility and Security

As the government rapidly adopts cloud technologies, the number of potential attack targets across various cloud environments and architectural frameworks are increasing. Increasing visibility into the entire cloud ecosystem is…

Learn More
Security Segmentation in a Small Manufacturing Environment

Security Segmentation in a Small Manufacturing...

Manufacturers are increasingly targeted in cyber-attacks.  Small manufacturers are particularly vulnerable due to limitations in staff and resources to operate facilities and manage cybersecurity. Security segmentation is a cost-effective and…

Learn More
State of the Facility Security Officer 2024

State of the Facility Security Officer 2024

Security officers are the backbone of every national security organization. Often the unsung heroes keep both classified information and proprietary information safe, they play a vital and required role in…

Learn More
Modern Approaches to Network Access Security

Modern Approaches to Network Access Security

The Cybersecurity and Infrastructure Security Agency (CISA) has frequently identified virtual private network (VPN) solutions that have been involved in many recent high-profile incidents, both with cyber criminals and nation-state…

Learn More
The Impact of Disasters on Agriculture and Food Security

The Impact of Disasters on Agriculture and Food...

Disasters are resulting in unprecedented levels of destruction across the world. These shocks and disruptions affect the functioning and sustainability of agricultural production and threaten the livelihoods of millions of…

Learn More