GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Zero Trust content

Executive Order 14306: Sustaining Select Efforts To Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144

Executive Order 14306: Sustaining Select Efforts...

The latest Executive Order reinforces America’s cybersecurity defenses amid escalating threats from foreign adversaries like China, Russia, and North Korea. It expands efforts around secure software development, quantum-resistant encryption, and…

Learn More
Zero Trust Data Protection

Zero Trust Data Protection

As organizations face increasingly sophisticated cybersecurity threats and stricter regulatory requirements, implementing a Zero Trust Architecture (ZTA) has become essential. This whitepaper explores how ZTA strengthens data protection by integrating…

Learn More
Cybersecurity: Network Monitoring Program Needs Further Guidance and Actions

Cybersecurity: Network Monitoring Program Needs...

Federal agencies are making strides in reducing cybersecurity risks thanks to the Continuous Diagnostics and Mitigation (CDM) program, but significant gaps remain. While CDM has improved agencies’ ability to respond…

Learn More
Implementing a Zero Trust Architecture: High-Level Document

Implementing a Zero Trust Architecture: High-Level...

The NIST Special Publication 1800-35 offers practical guidance for improving the security of manufacturing organizations through identity and access management (IAM). It outlines a collaborative approach using commercially available technologies…

Learn More
Securing Your Largest Attack Vector: Identity

Securing Your Largest Attack Vector: Identity

Common identity-based cyberattacks and how to protect your organization against them As traditional network perimeters fade, identity has become the new frontline in cybersecurity. From phishing and credential stuffing to…

Learn More
Russian GRU Targeting Western Logistics Entities and Technology Companies

Russian GRU Targeting Western Logistics Entities...

A joint cybersecurity advisory reveals that Russian GRU unit 26165 has been targeting Western logistics providers and technology firms involved in aid delivery to Ukraine. Using a blend of brute-force…

Learn More
NextLabs Approach to CISA’s Zero Trust Maturity Model (ZTMM)

NextLabs Approach to CISA’s Zero Trust Maturity...

CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust. CISA’s ZTMM is just one way an organization can implement their transition…

Learn More
Current Trends Shaping Zero Trust in Government

Current Trends Shaping Zero Trust in Government

As the traditional security perimeter dissolves, government agencies are turning to Zero Trust frameworks to defend against an expanded attack surface fueled by cloud adoption, machine identities, and insider threats.…

Learn More
Implementing Preventative Segregation of Duties with NextLabs

Implementing Preventative Segregation of Duties...

Segregation of duties (SoD), also called separation of duties, is a fundamental aspect of sustainable internal controls and risk management. The purpose of SoD is to prevent fraud, conflicts of…

Learn More
How Zero Trust Data Security Can Neutralize the Impact of Ransomware Attacks

How Zero Trust Data Security Can Neutralize the...

Ransomware attacks account for approximately 70% of all reported cyberattacks globally. These attacks continue to grow in sophistication and scale, increasingly targeting industries such as healthcare, financial services, manufacturing, and…

Learn More
Post Quantum Computing Security

Post Quantum Computing Security

The rise of quantum computing presents a significant threat to traditional encryption methods, potentially jeopardizing the security of wireless networks and the broader internet. While cryptographically relevant quantum computers (CRQCs)…

Learn More
Artificial Intelligence in Cellular Networks

Artificial Intelligence in Cellular Networks

The integration of Artificial Intelligence (AI) in cellular networks is transforming the way telecom infrastructures operate, optimizing everything from radio access networks (RAN) to network management. As 5G advances and…

Learn More
Why Zero Trust Data-Centric Security is a Better Approach to Protecting Data

Why Zero Trust Data-Centric Security is a Better...

In an era where data breaches and cyber threats are more sophisticated and prevalent than ever, traditional perimeter-based security measures are proving insufficient for protecting sensitive information, especially in federal…

Learn More
Implementing Zero Trust in the US Government

Implementing Zero Trust in the US Government

US government IT leaders are navigating a critical phase in cybersecurity, with agencies nearing the completion of their ambitious Zero Trust goals. Despite reaching implementation rates in the “high 90%…

Learn More
Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

Threat Actors Chained Vulnerabilities in Ivanti...

Cyber threats continue to evolve, and the latest attacks on Ivanti Cloud Service Applications highlight just how determined adversaries are. By chaining multiple vulnerabilities, threat actors were able to bypass…

Learn More