GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Technology content

CDM Approved Mobile Endpoint Security

CDM Approved Mobile Endpoint Security

Lookout rapidly detects and responds to mobile threats by leveraging the world’s largest mobile security dataset, threat intelligence services and persistent mobile EDR. Gain full visibility into the mobile threat…

Learn More
New Developments And Advances in 5G And Non-Terrestrial Networks

New Developments And Advances in 5G And...

The future of connectivity is expanding beyond terrestrial limits, with 5G and Non-Terrestrial Networks (NTN) playing a critical role in bridging coverage gaps. By integrating satellites, high-altitude platforms, and unmanned…

Learn More
Understanding Clayton Christensen’s “Disruptive Innovation” And Its Real-World Applications

Understanding Clayton Christensen’s “Disruptive...

Disruptive innovation reshapes industries by introducing simpler, more affordable alternatives that gradually improve and overtake established products. From personal computers replacing mainframes to streaming services dethroning cable TV, history is…

Learn More
Post Quantum Computing Security

Post Quantum Computing Security

The rise of quantum computing presents a significant threat to traditional encryption methods, potentially jeopardizing the security of wireless networks and the broader internet. While cryptographically relevant quantum computers (CRQCs)…

Learn More
A Security Perspective on the Web3 Paradigm

A Security Perspective on the Web3 Paradigm

Web3 is reimagining the internet by shifting control from large organizations to individual users, emphasizing decentralization, security, and data ownership. By leveraging blockchain technology, smart contracts, and digital tokens, Web3…

Learn More
Prioritizing Cybersecurity Risk for Enterprise Risk Management

Prioritizing Cybersecurity Risk for Enterprise...

Managing cybersecurity risks effectively is crucial for protecting an organization’s mission, operations, and reputation. The latest NIST Interagency Report (NIST IR 8286B) provides guidance on prioritizing cybersecurity risks within Enterprise…

Learn More
Medical Devices for the Assessment of Traumatic Brain Injury

Medical Devices for the Assessment of Traumatic...

Traumatic Brain Injury (TBI) assessment has evolved with medical device innovations, offering tools that support clinical evaluations. The FDA regulates these devices, categorizing them based on risk levels, ranging from…

Learn More
The Biggest Gap in Your Cyber Security Solution

The Biggest Gap in Your Cyber Security Solution

Everyone agrees threats to cyber security are on the rise. But how well do organizations understand which threats they should worry the most about? This white paper describes the most…

Learn More
DOD Satellite Communications: Reporting on Progress Needed to Provide Insight on New Approach

DOD Satellite Communications: Reporting on...

The Department of Defense (DOD) is shifting its approach to satellite communications (SATCOM) to create a more resilient and integrated system. Traditionally, DOD relied on high-cost satellites that operated independently,…

Learn More
Cloud Security: First Principles and Future Opportunities

Cloud Security: First Principles and Future...

SANS Cloud Security: First Principles and Future Opportunities eBook provides a comprehensive guide to securing cloud environments, with insights from SANS experts and major cloud providers (AWS, Google, Microsoft). This…

Learn More
SANS 2024 Top Attacks and Threats Report

SANS 2024 Top Attacks and Threats Report

The SANS 2024 Top Attacks and Threats Report analyzes emerging cyber threats, attack techniques, and defense strategies. Key topics include AI-driven attacks, deepfake identity fraud, exploitation of technical debt, and…

Learn More
Developing a Dashboard to Support Increasing Participation in STEM

Developing a Dashboard to Support Increasing...

The Research Community Dashboard, developed by RTI International, is helping the National Science Foundation (NSF) monitor progress towards its goal of enhancing participation in STEM. Through customizable, interactive data visualizations…

Learn More
Mend It, Don’t End It: It’s Time to Reset Clean Energy Policy by Focusing on Price/Performance Parity (P3)

Mend It, Don’t End It: It’s Time to Reset Clean...

The future of clean energy policy lies in innovation, not just subsidies and mandates. This report highlights the importance of reaching price/performance parity (P3), where clean technologies can compete with…

Learn More
X-ray Computed Tomography Flaw Phantom Development: Stepper Photolithography and Deep Reactive Ion Etching

X-ray Computed Tomography Flaw Phantom...

X-ray computed tomography (XCT) is a powerful tool for detecting flaws in advanced manufacturing. This study from NIST explores new methods to create precise defect artifacts using stepper photolithography and…

Learn More
Workshop on Enhancing Security of Devices and Components Across the Supply Chain

Workshop on Enhancing Security of Devices and...

Semiconductor security is at the forefront of ensuring the integrity of modern technology, from consumer electronics to critical infrastructure. The NIST workshop on supply chain security brought together industry, government,…

Learn More