As Artificial Intelligence (AI) integrates into more areas of human activity, its potential benefits and risks have been subject to increased public and government scrutiny, highlighting the need for stronger…
Learn MoreThrough its System Assessment and Validation for Emergency Responders program, the National Urban Security Technology Laboratory publishes information for responders about protective and operational equipment. This document provides guidance related…
Learn MoreSince the end of the Cold War, non-state actors (NSAs) have had an increasing and more consequential role in global dynamics, a trend that is likely to continue even as…
Learn MoreTo deliver more timely and effective solutions to the warfighter, the Department of Defense (DOD) revamped its department-wide acquisition policies in 2020. These policy changes responded to long-standing concerns that…
Learn MoreSwatting is a term used to describe criminal activity by an individual or group who knowingly provides false information to law enforcement suggesting that a serious threat exists at a…
Learn MoreOwners and operators across all industries are encountering increased drone activity over and around their facilities and assets. Careless or malicious drone operations present a unique threat to chemical facilities…
Learn MoreThis joint guide, developed as part of Cybersecurity and Infrastructure Security Agency’s High-Risk Community Protection initiative and National Cyber Security Centre-UK’s Defending Democracy campaign, provides mitigation measures for civil society…
Learn MoreIn early 2024, the authoring organizations observed pro-Russia hacktivists targeting vulnerable industrial control systems in North America and Europe. Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation…
Learn MoreThe National Security Agency Cybersecurity technical report categorizes hardware assurance threats that apply to field programmable gate arrays as described in the Joint Federated Assurance Center FPGA Level of Assurance…
Learn MoreAn organization must protect its information from unauthorized access and disclosure. Data breaches, large and small, can have far-reaching operational, financial, and reputational impacts on an organization. In the event…
Learn MoreDeploying artificial intelligence (AI) systems securely requires careful setup and configuration that depends on the complexity of the AI system, the resources required (e.g., funding, technical expertise), and the infrastructure…
Learn MoreOn October 20, 2023, the Biden Administration submitted to Congress a request for FY2024 emergency supplemental appropriations to address “key national security priorities.” President Biden characterized the request as a…
Learn MoreThe Department of Defense's (DoD) Defense Industrial Base (DIB) Cybersecurity Strategy serves as the Department’s strategic plan to enhance the cybersecurity and cyber resiliency of the DIB through an overarching…
Learn MoreSweden joined NATO on March 7, 2024, enlarging the alliance to 32 members. Amid heightened security concerns about Russia after its February 2022 invasion of Ukraine, both Finland and Sweden…
Learn MoreMost of the world’s people, resources, and economic activity are located not in the Western Hemisphere, but in the other hemisphere, particularly Eurasia. In response to this basic feature of…
Learn More