GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Technology content

Implementing a Zero Trust Architecture: High-Level Document

Implementing a Zero Trust Architecture: High-Level...

The NIST Special Publication 1800-35 offers practical guidance for improving the security of manufacturing organizations through identity and access management (IAM). It outlines a collaborative approach using commercially available technologies…

Learn More
Fortifying the Digital Frontline: Cybersecurity Strategies for the Future

Fortifying the Digital Frontline: Cybersecurity...

A recent roundtable discussion, hosted by ATARC and PaloAlto Networks, brought together experts to address the evolving challenges of cybersecurity within government agencies and the DOD. Discussion highlighted crucial issues…

Learn More
Report of the Virtual Workshop on Usable Cybersecurity and Privacy for Immersive Technologies

Report of the Virtual Workshop on Usable...

Immersive technologies like virtual, augmented, and mixed reality are rapidly transforming how we interact with digital environments—but they bring unique cybersecurity and privacy challenges. A recent NIST workshop explored how…

Learn More
NIST 800-162: Attribute-Based Access Control (ABAC)

NIST 800-162: Attribute-Based Access Control (ABAC)

NIST Special Publication (SP) 800-162 outlines Attribute-Based Access Control (ABAC) as a key data security implementation approach. ABAC enables organizations (including federal government/military) to enforce security policies dynamically based on…

Learn More
Latent Print Search Accuracy Against Rolled, Plain, and Contactless Known Prints

Latent Print Search Accuracy Against Rolled,...

Law enforcement agencies collect ten rolled and ten flat fingerprint impressions from all arrested individuals. However, some agencies are now allowing background check applicants or other non-arrest purposes to submit…

Learn More
The Future of Open Source Security: A Trust-First Approach to the Federal Supply Chain

The Future of Open Source Security: A Trust-First...

Explore key takeaways from the ATARC + Chainguard roundtable in “The Future of Open Source Security: A Trust-First Approach to the Federal Supply Chain.” This whitepaper offers strategic insights for…

Learn More
IT Excellence Underpins the DoD Mission

IT Excellence Underpins the DoD Mission

Learn how Empower AI supported the DoD with mission-critical support at the customer service center. Through expertly deployed technology and automation, the department was able to better manage its 75,000…

Learn More
AI Services Framework

AI Services Framework

The AI Services Framework gives federal government agencies a pathway to adopt and expand artificial intelligence capabilities with confidence. Using pre-built accelerators, real-world use cases and a sound data strategy,…

Learn More
Executive Order 14261: Reinvigorating America’s Beautiful Clean Coal Industry and Amending Executive Order 14241

Executive Order 14261: Reinvigorating America’s...

America’s latest executive order puts coal back at center stage, declaring it vital to the nation’s economic prosperity, grid reliability, and even the power-hungry growth of AI data centers. It…

Learn More
Executive Order 14262: Strengthening the Reliability and Security of the United States Electric Grid

Executive Order 14262: Strengthening the...

Executive Order 14262 aims to reinforce the reliability and security of the U.S. electric grid in response to rising demand from AI growth and domestic manufacturing. The Department of Energy…

Learn More
Modernizing RMF for Continuous, Evidence-Based Security

Modernizing RMF for Continuous, Evidence-Based...

The fastest way to move RMF away from compliance and into the mission space is to stop treating authorization as a milestone and start treating it as a continuous engineering…

Learn More
Revolutionizing Enterprise Data Management with Data Mesh and Microsoft Fabric

Revolutionizing Enterprise Data Management with...

As enterprise data ecosystems grow in complexity, traditional centralized data architectures often fall short. This whitepaper explores how Data Mesh, a decentralized socio-technical approach, offers a transformative solution for managing…

Learn More
Primary Mitigations to Reduce Cyber Threats to Operational Technology

Primary Mitigations to Reduce Cyber Threats to...

Cyber threats targeting operational technology (OT) systems continue to pose a serious risk to U.S. critical infrastructure. In response, CISA, the FBI, EPA, and DOE have outlined key mitigations, including…

Learn More
Nextlabs and Access Controls of NIST SP 800-53

Nextlabs and Access Controls of NIST SP 800-53

NIST SP 800-53 Revision 5 details a framework to protect organizations, the federal government/military, and their assets from a range of threats, including cyberattacks, insider threats, application security, supply chain…

Learn More
The Use of Real Time Spending Sources for Economic Measurement: An Analysis Using Multiple Data Sources

The Use of Real Time Spending Sources for Economic...

This study from the Bureau of Economic Analysis explores the potential of using credit and debit card transaction data to improve real-time consumer spending estimates. By integrating multiple commercial datasets,…

Learn More