White Papers

In-Depth Reports on Cyber Security

Our latest white papers include technical reports on end-to-end secure mobile voice and framework for autonomous machines.

A Process to Implement Zero Trust Access

Katie Teitler | July 23, 2020

Requirements for Security Performance Management

Edward Amoroso | July 06, 2020

Data Sharding for Back-End Cloud Security

Edward Amoroso | May 05, 2020

Respond Software Launches First Responder Service

Edward Amoroso | December 09, 2019

OpenText to Acquire Carbonite

Edward Amoroso | November 20, 2019

Randori Announces Recon Platform Availability - 10/24/19

Edward Amoroso | October 25, 2019

Identity-Based Improvement to Zero Trust

Edward Amoroso | September 03, 2019

Three Generations of Automated Cyber Attacks

Edward Amoroso | May 22, 2019

Evolution of the Zero Trust Model for Cyber Security

Edward Amoroso | October 11, 2018

Cyber Security Framework For Autonomous Machines

Edward Amoroso | September 18, 2018

The Role of Commercial End-to-End Secure Mobile Voice in Cyberspace

Edward Amoroso | April 25, 2018

vArmour Technical Report

Edward Amoroso | February 25, 2018

Cyberlytic Technical Report

Edward Amoroso | February 25, 2018