https://www.sans.org/reading-room/whitepapers/standards/paper/549
This SANS whitepaper defines FIPS, identify FIPS approved encryption algorithms, and examine some different vendor solutions and their use of these approved algorithms.
https://www.sans.org/white-papers/38945/
This paper examines the vulnerabilities of VoWiFi calling, assesses what common and less well-known attacks are able to exploit those vulnerabilities, and then proposes technological or procedural security protocols to harden telephony systems against adversary exploitation.
https://www.sans.org/white-papers/1701/
This paper focuses on these VoIP specific security threats and the countermeasures to mitigate the problem.
https://www.sans.org/white-papers/35817/
This SANS whitepaper discusses the need for web application firewalls.
https://securityboulevard.com/2019/12/endpoints-and-network-segmentation-best-practices/
This article speaks to the deficiencies in current network segmentation for the endpoint and network segmentation best practices.
https://www.spamlaws.com/how-malicious-mobile-code-works.html
This article describes what malicious mobile code is and how to protect against it.
https://suny.oneonta.edu/policy-library/policies-z/vpn-policy
This policy from The State University of New York at Oneonta provides sample guidelines for VPN access.
https://blog.techprognosis.com/evaluating-web-browser-security/
This blog post discusses some of the web browser security settings options.
https://www.techtarget.com/searchsecurity/tip/2019s-top-email-security-best-practices-for-employees
This article offers some simple tips on securing email from both administrative and end user perspectives.
https://techbeacon.com/security/5-essential-steps-securing-enterprise-mobile-apps
This article outlines several best practices for safeguarding sensitive information that is processed by mobile apps use by an organization.