GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Awareness content

Academy Learning Center

Academy Learning Center

The Academy Learning Center (ALC) provides continuous access to expert-led courses that strengthen online operations and reduce human-side risks. Its curriculum begins with managed attribution training to help users safeguard…

Learn More
Modernizing Online Operations for Inspector General Investigations

Modernizing Online Operations for Inspector...

For today’s Offices of Inspectors General (OIG), secure online access is critical to investigating fraud, abuse, and misconduct across surface, deep, and dark web environments. Traditional tools leave investigators exposed,…

Learn More
Managed Attribution: The Foundation for Effective Cyber Operations

Managed Attribution: The Foundation for Effective...

Managed attribution (MA) is the practice of controlling the technical and behavioral indicators that shape your online identity. In today’s environment, platforms use AI-driven behavioral analytics to detect anomalies, making…

Learn More
Why Government Agencies Choose Verkada for Physical Security

Why Government Agencies Choose Verkada for...

Government agencies are adopting Verkada’s hybrid cloud platform to modernize physical security across offices, labs, remote sites, and conservation areas. Its NDAA-compliant cameras, GovCloud hosting, and FIPS-validated hardware meet strict…

Learn More
Criminal Victimization in the 22 Largest U.S. States, 2020–2022

Criminal Victimization in the 22 Largest U.S....

The Bureau of Justice Statistics’ new report shows violent crime rates fell nationwide and in several large states between 2017–19 and 2020–22. Property crime also declined in most areas, though…

Learn More
Technifying Ventures

Technifying Ventures

This paper explores new methods for improving economic statistics by combining survey responses with administrative and third-party data. By leveraging these linked data sources, researchers can reduce reporting burdens, enhance…

Learn More
Intelligence Reform at 20

Intelligence Reform at 20

Twenty years after major intelligence reforms, joint military intelligence is struggling to keep pace with warfighter needs. Training has leaned heavily on analytic tradecraft standards but often overlooks the joint…

Learn More
CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

CISA and USCG Identify Areas for Cyber Hygiene...

After a proactive threat hunt across multiple federal networks, CISA and its partners identified key gaps in cyber hygiene that adversaries could exploit. The advisory reveals common weaknesses—like poor credential…

Learn More
The Journey to Zero Trust

The Journey to Zero Trust

In a Zero Trust world, the perimeter is everywhere—and microsegmentation is key to controlling it. This guidance from CISA and NSA helps agencies implement microsegmentation strategies that limit lateral movement…

Learn More
Digital Identity Guidelines

Digital Identity Guidelines

Establishing trust in digital identities is foundational for secure government and public services. NIST SP 800-63-4 provides the overarching framework for identity proofing, authentication, and federation across digital systems. This…

Learn More
Digital Identity Guidelines

Digital Identity Guidelines

Verifying identity in the digital age is more than a checkbox—it’s a foundational element of trust. NIST’s updated 800-63A-4 offers detailed guidance for federal agencies and organizations on secure, privacy-respecting…

Learn More
Executive Order 14323: Addressing Threats to the United States by the Government of Brazil

Executive Order 14323: Addressing Threats to the...

Executive Order 14323 kicks off a government-wide overhaul of personnel vetting to strengthen national security and public trust. By streamlining investigations, modernizing policies, and improving data sharing, the order aims…

Learn More
Kids and Teens: Online Addiction is a Thing

Kids and Teens: Online Addiction is a Thing

Online addiction is more than just extra screen time—it can seriously affect teens’ sleep, mental health, and real-world relationships. This guide outlines how constant exposure to social media and gaming…

Learn More
HOW2SPOT Online Predators

HOW2SPOT Online Predators

Online predators often appear friendly and trustworthy, making it difficult for kids and teens to recognize unsafe behavior. This resource helps young people identify red flags—like requests for personal information,…

Learn More
Primary Screening for Passengers

Primary Screening for Passengers

As air travel rebounds to pre-pandemic levels, the TSA is under increasing pressure to screen more passengers for a wider range of threats—quickly and accurately. DHS’s Science and Technology Directorate…

Learn More