GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Technology content

Driving Success in the Public Sector With DevSecOps

Driving Success in the Public Sector With DevSecOps

Organizations increasingly have been turning to DevOps to make the development and deployment of business-critical software more efficient and reliable. But speeding software development without keeping security top of mind…

Learn More
Achieving Innovative, Secure, Fast and Compliant Software Solutions for the Government Sector

Achieving Innovative, Secure, Fast and Compliant...

The internet, supercomputers, satellites, closed captioning, lactose free milk — all of these exist because of teams of government innovators. The government has long been a leader in innovation, but…

Learn More
One Identity Cloud PAM Essentials

One Identity Cloud PAM Essentials

Privileged Access Management (PAM) solutions play a crucial role in strengthening an organization’s security posture as they secure, control, monitor, analyze and govern privileged access across various environments and platforms.…

Learn More
Why the United States and EU Should Seize the Moment to Cooperate on Cybersecurity Labeling for IoT Devices

Why the United States and EU Should Seize the...

The United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…

Learn More
Ready Armor Protection for Instant Deployment

Ready Armor Protection for Instant Deployment

The Department of Homeland Security Science and Technology Directorate’s Physical Security program focuses on security awareness for soft targets and crowded places. A key focus area is mitigating hostile vehicle…

Learn More
U.S. Farm Workers Be Replaced by Machines?

U.S. Farm Workers Be Replaced by Machines?

The U.S. has had about 2.5 million hired farm workers since the Immigration Reform and Control Act of 1986 (IRCA) legalized 1.1 million unauthorized farm workers and made it easier…

Learn More
H.R. 7521 Regulation of TikTok: Analysis of Selected Legal Issues

H.R. 7521 Regulation of TikTok: Analysis of...

On March 13, 2024, the House of Representatives passed the Protecting Americans from Foreign Adversary Controlled Applications Act (H.R. 7521). If enacted, H.R. 7521 would make it unlawful to provide…

Learn More
Artificial Intelligence & Medical Products:  How CBER, CDER, CDRH, and OCP are Working Together

Artificial Intelligence & Medical Products: How...

The complex and dynamic processes involved in the development, deployment, use, and maintenance of AI technologies benefit from careful management throughout the medical product life cycle. Specifically, end-to-end management of…

Learn More
States Embrace E-Signatures to Support Secure and Convenient Elections

States Embrace E-Signatures to Support Secure and...

Securing elections and making them more accessible and convenient, including the administrative processes that support them, are mission-critical priorities for U.S. states and territories. Secure and trusted voter identification is…

Learn More
Wildfire Sensor Technology

Wildfire Sensor Technology

Wildfires across the U.S. and around the world are becoming more frequent, costly, and dangerous. The Department of Homeland Security Science and Technology Directorate is working with the U.S. Fire…

Learn More
Sustaining Our People Advantage in Data Centric Warfare

Sustaining Our People Advantage in Data Centric...

The speed of change in all aspects of technology, from artificial intelligence to robotics, makes it difficult to predict what a conflict will look like in the future, but we…

Learn More
How Federal Funding for Basic Research Spurs Clean Energy Discoveries the World Needs: Eight Case Studies

How Federal Funding for Basic Research Spurs Clean...

Addressing climate change is urgent, which is why so many activists, pundits, and elected officials argue for taking action now by banning fossil fuels, subsidizing or mandating the production or…

Learn More
How Innovative Is China in the Robotics Industry?

How Innovative Is China in the Robotics Industry?

While the United States invented robotics, it is now an also-ran—at least in production—with the leading robotics companies located in engineering powerhouses of Germany, Japan, and Switzerland. However, by volume,…

Learn More
Advancing Zero Trust Maturity Throughout the  Network and Environment Pillar

Advancing Zero Trust Maturity Throughout the ...

The network and environment pillar works in concert with the other Zero Trust pillars as part of a holistic Zero Trust security model that assumes adversary breaches occur inside the…

Learn More
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure

PRC State-Sponsored Actors Compromise and Maintain...

As the authoring agencies have previously highlighted, the use of living off the land (LOTL) techniques is a hallmark of Volt Typhoon actors’ malicious cyber activity when targeting critical infrastructure.…

Learn More