This paper explores new methods for improving economic statistics by combining survey responses with administrative and third-party data. By leveraging these linked data sources, researchers can reduce reporting burdens, enhance…
Learn MoreTwenty years after major intelligence reforms, joint military intelligence is struggling to keep pace with warfighter needs. Training has leaned heavily on analytic tradecraft standards but often overlooks the joint…
Learn MoreAfter a proactive threat hunt across multiple federal networks, CISA and its partners identified key gaps in cyber hygiene that adversaries could exploit. The advisory reveals common weaknesses—like poor credential…
Learn MoreIn a Zero Trust world, the perimeter is everywhere—and microsegmentation is key to controlling it. This guidance from CISA and NSA helps agencies implement microsegmentation strategies that limit lateral movement…
Learn MoreEstablishing trust in digital identities is foundational for secure government and public services. NIST SP 800-63-4 provides the overarching framework for identity proofing, authentication, and federation across digital systems. This…
Learn MoreVerifying identity in the digital age is more than a checkbox—it’s a foundational element of trust. NIST’s updated 800-63A-4 offers detailed guidance for federal agencies and organizations on secure, privacy-respecting…
Learn MoreExecutive Order 14323 kicks off a government-wide overhaul of personnel vetting to strengthen national security and public trust. By streamlining investigations, modernizing policies, and improving data sharing, the order aims…
Learn MoreOnline addiction is more than just extra screen time—it can seriously affect teens’ sleep, mental health, and real-world relationships. This guide outlines how constant exposure to social media and gaming…
Learn MoreOnline predators often appear friendly and trustworthy, making it difficult for kids and teens to recognize unsafe behavior. This resource helps young people identify red flags—like requests for personal information,…
Learn MoreAs air travel rebounds to pre-pandemic levels, the TSA is under increasing pressure to screen more passengers for a wider range of threats—quickly and accurately. DHS’s Science and Technology Directorate…
Learn MoreCBPLink is a cloud-based system used by U.S. Customs and Border Protection to streamline internal communication, case management, and operational collaboration across divisions. This Privacy Impact Assessment ensures that CBPLink’s…
Learn MoreDirect Guard Services stands out among top security companies in Los Angeles, offering professional, reliable protection tailored to your needs. From armed and unarmed guards to mobile patrols, fire watch,…
Learn MoreBehavioral Threat Assessment and Management (BTAM) is a structured, community-based strategy for identifying and addressing early warning signs of potential violence. Led by the DHS Center for Prevention Programs and…
Learn MoreThe Dams Sector Personnel Screening Guide by CISA provides owners and operators of dams, levees, and related infrastructure with strategies to mitigate insider threats through effective pre-employment screening. It outlines…
Learn MoreAs aging infrastructure and new threats challenge the Dams Sector, innovation is critical to building long-term resilience. This roadmap outlines key research and development priorities—ranging from advanced materials and remote…
Learn More