GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

Security Primer – TrickBot

Security Primer – TrickBot

TrickBot is a modular banking trojan that targets sensitive information and acts as a dropper for other malware. Since June 2019, the MS-ISAC is observing an increasingly close relationship between…

Learn More
The Evolution of Security in 5G

The Evolution of Security in 5G

5G is not only about “faster, bigger or better” networks. It is about enabling a diverse new set of services and use cases affecting nearly every aspect of our lives.…

Learn More
NB-IoT Security

NB-IoT Security

Prevent signaling threats from Narrowband IoT devices and secure your CIoT services against DoS attacks from weaponized CIoT devices, malware, ransomware, and other vulnerabilities. Palo Alto Networks K2-Series 5G-ready next-generation…

Learn More
Election Security: State Policies

Election Security: State Policies

Ensuring the integrity and security of the election process is essential for the functioning of democracy in the U.S., and is a shared responsibility among many officials. Local election administrators…

Learn More
Security Considerations for the 5G Era

Security Considerations for the 5G Era

5G is an evolving technology that will usher in an age of accelerated innovation connecting people, things and machines, through continuing improvements in mobile wireless communications. This 5G Americas whitepaper…

Learn More
Privacy Without Monopoly: Data Protection and Interoperability

Privacy Without Monopoly: Data Protection and...

The problems of corporate concentration and privacy on the Internet are inextricably linked. A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more…

Learn More
Physical Security for Cold Storage Locations

Physical Security for Cold Storage Locations

As America prepares for distribution of coronavirus vaccine, the security and integrity of facilities that will receive, house, and distribute COVID-19 vaccines has come into focus. Supply chain and cold…

Learn More
Cyber Threat Activity Targeting Elections

Cyber Threat Activity Targeting Elections

FireEye gathers and analyzes considerable amounts of proprietary data from victim, adversary and machine intelligence and sensors worldwide, as well as managed detection and response, incident response and other consulting…

Learn More
Protect 2020 Strategic Plan

Protect 2020 Strategic Plan

In January 2017, DHS designated the infrastructure used to administer the Nation’s elections as critical infrastructure. This designation recognizes that the United States’ election infrastructure is of such vital importance…

Learn More
Continuous Compliance is Your Best Protection

Continuous Compliance is Your Best Protection

All organizations are vulnerable to cybersecurity attacks in some way. The common thread among all organizations, including the United States federal government, is the necessity to continuously validate and improve…

Learn More
Building Secure Microservices-based Applications Using Service-Mesh Architecture

Building Secure Microservices-based Applications...

The increasing trend in building microservices-based applications calls for addressing security in all aspects of service-to-service interactions due to their unique characteristics. The distributed cross-domain nature of microservices needs secure…

Learn More
Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment

Assessing Information Security Continuous...

This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs within federal, state, and local governmental…

Learn More
Using AWS in the Context of NHS Cloud Security Guidance

Using AWS in the Context of NHS Cloud Security...

The explicit guidance on the secure use of hyperscale cloudservices was published in January 2018 by four key UK Public Sector Health bodies: NHS Digital, the Department of Health and…

Learn More
PwC Cortex Managed Services Solution Brief

PwC Cortex Managed Services Solution Brief

Cortex™ AI-based continuous security platform by Palo Alto Networks delivers new levels of simplicity in security operations and significantly improved security outcomes through automation and unprecedented accuracy. The platform solves…

Learn More
5 Critical Mistakes When Evaluating A Next-Generation Firewall

5 Critical Mistakes When Evaluating A...

The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two organizations have the same needs, risks and data flow. You need…

Learn More