GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Technology content

Governing AI with Existing Authorities

Governing AI with Existing Authorities

Recent advances in generative artificial intelligence (AI) have captured the public’s attention and sparked a widespread debate about how the government should regulate this powerful technology. A variety of policy…

Learn More
2023–2024 Goals and Objectives for Arctic Research

2023–2024 Goals and Objectives for Arctic Research

Arctic climate change continues to impact the region’s environmental, social, cultural, political, economic, and security landscapes. The repercussions have drawn more attention to the Arctic, highlighting its inherent value and…

Learn More
Powering Space Exploration

Powering Space Exploration

On both terrestrial and non-terrestrial planets and the space between, human technology thrives using a well-known power: solar energy. This executive briefing probes photovoltaic technologies used in space exploration, highlighting…

Learn More
NIST 800-207: Zero Trust Architecture

NIST 800-207: Zero Trust Architecture

To address cybersecurity challenges organizations may face, the National Cybersecurity Center of Excellence collaborates with government agencies, organizations, and academic institutions to emphasize the importance of implementing Zero Trust Architecture.…

Learn More
Textile Recycling Technologies

Textile Recycling Technologies

The U.S. is one of the top consumers of textiles in the world, and clothing brands produce approximately twice the amount of clothing today compared to two decades ago. Driven…

Learn More
Advancing Zero Trust Maturity Throughout the Automation and Orchestration Pillar

Advancing Zero Trust Maturity Throughout the...

Zero Trust (ZT) is an “evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.” Unlike a traditional perimeter-based network security…

Learn More
Secure by Design Alert: Eliminating OS Command Injection Vulnerabilities

Secure by Design Alert: Eliminating OS Command...

Operating system (OS) command injection vulnerabilities are a preventable class of vulnerability in software products. Software manufacturers can eliminate them at the source by taking a secure by design approach.…

Learn More
Eyes Wide Open: Harnessing the Remote Sensing and Data Analysis Industries

Eyes Wide Open: Harnessing the Remote Sensing and...

Remote sensing has a long history in the United States, but a relatively short commercial one. The 2020 National Space Policy explicitly states “that long-term United States national security and…

Learn More
Quantum Sensing: Demystifying the Capabilities of Quantum Technologies Available Today and in the Future

Quantum Sensing: Demystifying the Capabilities of...

While realizing the full potential of many quantum technologies may still be years away, tech development is rapidly progressing, promising to unlock new capabilities across various applications and industries. For…

Learn More
Secure the Election Process with Lookout

Secure the Election Process with Lookout

Governments are under more pressure to secure the election process than ever before. Disinformation can spread like wildfire amidst the endless back and forth of cyberespionage campaigns from other nation…

Learn More
Homeland Explosive Consequence and Threat Tool: HEXCAT

Homeland Explosive Consequence and Threat Tool:...

HExCAT is an explosive hazard modeling tool that estimates the potential impact and consequences of an explosion, including severity and types of injures, effectiveness of response, choke points and building…

Learn More
Mitigating Artificial Intelligence Risk: Safety and Security Guidelines for Critical Infrastructure Owners and Operators

Mitigating Artificial Intelligence Risk: Safety...

While artificial intelligence (AI) has the potential to deliver transformative solutions for U.S. critical infrastructure, the introduction of AI systems into critical infrastructure has the potential to make those systems…

Learn More
Enabling Principles for Artificial Intelligence Governance

Enabling Principles for Artificial Intelligence...

The question of how to govern artificial intelligence (AI) is rightfully top of mind for U.S. lawmakers and policymakers alike. Strides in the development of high-powered large language models  like…

Learn More
Research and Development: U.S. Trends and International Comparisons

Research and Development: U.S. Trends and...

Research and Experimental Development (R&D) refers to creative and systematic work aimed at increasing the stock of knowledge and is broken down into three categories: basic research, applied research, and…

Learn More
U.S. Department of Energy Cybersecurity Strategy

U.S. Department of Energy Cybersecurity Strategy

Cybersecurity is a top priority of this Administration. In May 2021, President Biden issued Executive Order 14028, Improving the nation’s Cybersecurity, which makes a significant contribution towards the modernization of…

Learn More