GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

NB-IoT Security

NB-IoT Security

Prevent signaling threats from Narrowband IoT devices and secure your CIoT services against DoS attacks from weaponized CIoT devices, malware, ransomware, and other vulnerabilities. Palo Alto Networks K2-Series 5G-ready next-generation…

Learn More
Security Primer – TrickBot

Security Primer – TrickBot

TrickBot is a modular banking trojan that targets sensitive information and acts as a dropper for other malware. Since June 2019, the MS-ISAC is observing an increasingly close relationship between…

Learn More
The Evolution of Security in 5G

The Evolution of Security in 5G

5G is not only about “faster, bigger or better” networks. It is about enabling a diverse new set of services and use cases affecting nearly every aspect of our lives.…

Learn More
Election Security: State Policies

Election Security: State Policies

Ensuring the integrity and security of the election process is essential for the functioning of democracy in the U.S., and is a shared responsibility among many officials. Local election administrators…

Learn More
Security Considerations for the 5G Era

Security Considerations for the 5G Era

5G is an evolving technology that will usher in an age of accelerated innovation connecting people, things and machines, through continuing improvements in mobile wireless communications. This 5G Americas whitepaper…

Learn More
Transmission Security (TRANSEC)

Transmission Security (TRANSEC)

We at iDirect recognize the critical need to protect the flow of communications to wherever the military and government agencies may operate. Wherever this may be, threat actors readily stand…

Learn More
Security Primer – Ransomware

Security Primer – Ransomware

Throughout 2019, state, local, tribal, and territorial (SLTT) government entities are increasingly encountering ransomware attacks resulting in significant network downtime, delayed services to constituents, and costly remediation efforts. As of…

Learn More
Security Primer – IcedID

Security Primer – IcedID

IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper for other malware. It uses a man-in-the-browser…

Learn More
Mobile Device Security

Mobile Device Security

The National Cybersecurity Center of Excellence (NCCoE) is addressing the challenge of mobile device security for enterprises through collaborative efforts with industry and the information technology (IT) community, including vendors…

Learn More
Security Primer – Ryuk

Security Primer – Ryuk

Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number one reported variant of 2019, accounting for approximately a…

Learn More
Using AWS in the Context of NHS Cloud Security Guidance

Using AWS in the Context of NHS Cloud Security...

The explicit guidance on the secure use of hyperscale cloudservices was published in January 2018 by four key UK Public Sector Health bodies: NHS Digital, the Department of Health and…

Learn More
Continuous Compliance is Your Best Protection

Continuous Compliance is Your Best Protection

All organizations are vulnerable to cybersecurity attacks in some way. The common thread among all organizations, including the United States federal government, is the necessity to continuously validate and improve…

Learn More
Privacy Without Monopoly: Data Protection and Interoperability

Privacy Without Monopoly: Data Protection and...

The problems of corporate concentration and privacy on the Internet are inextricably linked. A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more…

Learn More
PwC Cortex Managed Services Solution Brief

PwC Cortex Managed Services Solution Brief

Cortex™ AI-based continuous security platform by Palo Alto Networks delivers new levels of simplicity in security operations and significantly improved security outcomes through automation and unprecedented accuracy. The platform solves…

Learn More
5 Critical Mistakes When Evaluating A Next-Generation Firewall

5 Critical Mistakes When Evaluating A...

The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two organizations have the same needs, risks and data flow. You need…

Learn More