https://www.digicert.com/blog/mitigating-risk-considering-your-certificate-practices
This blog post is for developers and manufacturers working with private-trust client or device certificates, such as those used in a software application or IoT device.
https://dl.dod.cyber.mil/wp-content/uploads/trn/online/disa-cac-2024/pdf/DISA_CAC2024_WebUse.pdf
This DoD Security Tip provides guidance on malicious code and how to protect an organization’s information systems from it.
https://dodprocurementtoolbox.com/cms/node/7341
This provides a response to an FAQ regarding protection of CUI at rest through physical and logical protections other than encryption.
https://www.enterprisenetworkingplanet.com/security/5-steps-to-securing-your-enterprise-mobile-apps/
This article outlines several best practices for safeguarding sensitive information that is processed by mobile apps use by an organization.
https://www.epa.gov/system/files/documents/2023-11/information_security_system_and_communications_protection_procedure.pdf
This example procedure from the EPS facilitates the implementation of security control requirements for the System and Communications Protection control family, as identified NIST SP 800-53.
https://expertinsights.com/web-security/the-top-dns-web-filtering-platforms-for-businesses
A list of web content filtering solutions provided by Expert Insights.
Federal Communications Commission – Voice Over Internet Protocol (VoIP) – Federal Communications Commission
3.13 3.13.14 System and Communications Protection
https://www.fcc.gov/general/voice-over-internet-protocol-voip
This publication from the FCC provides answers to FAQs about VoIP.
https://consumer.ftc.gov/articles/how-secure-your-home-security-cameras
This article describes how to secure and access webcams.
Fixstars – High-Performance Networking Series 4: CPU Tuning for Jitter-Sensitive Applications
3.13 3.13.4 System and Communications Protection
https://blog.us.fixstars.com/not-done-high-performance-networking-series-4-cpu-tuning-for-jitter-sensitive-applications/
This article describes technologies to minimize jitter and latencies caused by shared hardware resources.
https://www.ignyteplatform.com/blog/fedramp/fips-validated-cryptographic-modules/
This article from Ignyte describes what it means for CMMC and FedRAMP to follow the FIPS standard.