GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Cybersecurity Content

Cybersecurity Quarterly

Cybersecurity Quarterly

This quarter’s theme is cyber defense—not a new topic, but one where there have been a number of very important recent advances. These advances support the promise of a future…

Learn More
Cybersecurity for Small Business

Cybersecurity for Small Business

Someone in your company gets an email. It looks legitimate, but with one click on a link, or one download of an attachment, everyone is locked out of your network.…

Learn More
Cybersecurity Lessons From the Pandemic

Cybersecurity Lessons From the Pandemic

The COVID-19 pandemic illustrates the challenge of ensuring resilience and continuity in a connected world. Many of the effects of this new breed of crisis can be significantly ameliorated through…

Learn More
Cybersecurity: How to Mitigate the Risk

Cybersecurity: How to Mitigate the Risk

Cybersecurity is everyone’s responsibility. A strategy with multiple layers of protection that evolves with time is essential to achieve greater cyber resiliency. As a provider of security, operations, and business…

Learn More
Advancing Cybersecurity at Scale in the Cloud

Advancing Cybersecurity at Scale in the Cloud

Cyber attacks in the public sector are on the rise. According to a July 2019 report by a Senate homeland security subcommittee, the number of cyberattacks reported by federal agencies…

Learn More
Cybersecurity Incentives Policy White Paper

Cybersecurity Incentives Policy White Paper

In March 2019, pursuant to section 219 of the Federal Power Act (FPA), the Commission issued a Notice of Inquiry seeking comment on the scope and implementation of its electric…

Learn More
IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements

IoT Device Cybersecurity Guidance for the Federal...

Federal agencies will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and implementation of IoT devices.…

Learn More
Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification (CMMC)

Department of Defense (DoD) requires proof of CMMC compliance to ensure protection of controlled unclassified information (CUI) from nation-state and nefarious actors, while keeping the supply chain running safely. Is…

Learn More
Critical Cybersecurity Hygiene: Patching the Enterprise

Critical Cybersecurity Hygiene: Patching the...

Cyber hygiene describes recommended mitigations for the small number of root causes responsible for many cybersecurity incidents. Implementing a few simple practices can address these common root causes. Patching is…

Learn More
15 Calls to Action in Federal Cybersecurity for 2020

15 Calls to Action in Federal Cybersecurity for...

This is a high level summary of 15 Calls to Action in federal cybersecurity culled from the 10th Annual Billington CyberSecurity Summit. Over 75 top experts from around the world…

Learn More
Approaches for Federal Agencies to Use the Cybersecurity Framework

Approaches for Federal Agencies to Use the...

The document highlights examples for implementing the Framework for Improving Critical Infrastructure Cybersecurity (known as the Cybersecurity Framework) in a manner that complements the use of other NIST security and…

Learn More
Integrating Cybersecurity and Enterprise Risk Management (ERM)

Integrating Cybersecurity and Enterprise Risk...

The increasing frequency, creativity, and variety of cybersecurity attacks means that all enterprises should ensure cybersecurity risk is getting the appropriate attention within their enterprise risk management (ERM) programs. This…

Learn More
5G Cybersecurity: Preparing a Secure Evolution to 5G

5G Cybersecurity: Preparing a Secure Evolution to...

Cellular networks will be transitioning from 4G to 5G, and 5G networks will provide increased cybersecurity protections. This project will identify several 5G use case scenarios and demonstrate for each…

Learn More
IoT Device Cybersecurity Capability Core Baseline

IoT Device Cybersecurity Capability Core Baseline

Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device hardware and software). This publication defines an Internet of Things (IoT)…

Learn More
Cybersecurity: It’s More than Just Technology

Cybersecurity: It’s More than Just Technology

The term “cybersecurity” is commonly associated with the protection of digital data from theft or compromise by hackers. For enterprise customers, however, most data breaches aren’t the result of technology…

Learn More