GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Awareness content

U.S. Customs and Border Protection Artificial Intelligence Use and Reporting

U.S. Customs and Border Protection Artificial...

As AI becomes central to mission operations, CBP has established a comprehensive governance framework to ensure these technologies are used lawfully, securely, and responsibly. This directive outlines how AI must…

Learn More
Protect Your Smart Device

Protect Your Smart Device

Smart devices have become essential to daily life—but their value and the personal data they hold also make them prime targets for theft and misuse. This FCC guide explains simple…

Learn More
Wireless Connections and Bluetooth Security Tips

Wireless Connections and Bluetooth Security Tips

Staying connected on the go is convenient, but this guide shows how easily public Wi-Fi and Bluetooth connections can expose your devices to cyberthreats. The FCC explains common risks—from imposter…

Learn More
USDA Safety Manual

USDA Safety Manual

This Safety Manual from USDA’s Specialty Crops Inspection Division provides clear, practical guidance to keep inspectors safe across diverse work environments—from warehouses and rail yards to laboratories and cold storage…

Learn More
Sexual Harassment

Sexual Harassment

Sexual harassment in federally funded research environments continues to undermine safety, career advancement, and policy accountability. The GAO report highlights major delays by OSTP and NSF in implementing mandated actions,…

Learn More
Academy Learning Center

Academy Learning Center

The Academy Learning Center (ALC) provides continuous access to expert-led courses that strengthen online operations and reduce human-side risks. Its curriculum begins with managed attribution training to help users safeguard…

Learn More
Modernizing Online Operations for Inspector General Investigations

Modernizing Online Operations for Inspector...

For today’s Offices of Inspectors General (OIG), secure online access is critical to investigating fraud, abuse, and misconduct across surface, deep, and dark web environments. Traditional tools leave investigators exposed,…

Learn More
Managed Attribution: The Foundation for Effective Cyber Operations

Managed Attribution: The Foundation for Effective...

Managed attribution (MA) is the practice of controlling the technical and behavioral indicators that shape your online identity. In today’s environment, platforms use AI-driven behavioral analytics to detect anomalies, making…

Learn More
Why Government Agencies Choose Verkada for Physical Security

Why Government Agencies Choose Verkada for...

Government agencies are adopting Verkada’s hybrid cloud platform to modernize physical security across offices, labs, remote sites, and conservation areas. Its NDAA-compliant cameras, GovCloud hosting, and FIPS-validated hardware meet strict…

Learn More
Criminal Victimization in the 22 Largest U.S. States, 2020–2022

Criminal Victimization in the 22 Largest U.S....

The Bureau of Justice Statistics’ new report shows violent crime rates fell nationwide and in several large states between 2017–19 and 2020–22. Property crime also declined in most areas, though…

Learn More
Technifying Ventures

Technifying Ventures

This paper explores new methods for improving economic statistics by combining survey responses with administrative and third-party data. By leveraging these linked data sources, researchers can reduce reporting burdens, enhance…

Learn More
Intelligence Reform at 20

Intelligence Reform at 20

Twenty years after major intelligence reforms, joint military intelligence is struggling to keep pace with warfighter needs. Training has leaned heavily on analytic tradecraft standards but often overlooks the joint…

Learn More
CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

CISA and USCG Identify Areas for Cyber Hygiene...

After a proactive threat hunt across multiple federal networks, CISA and its partners identified key gaps in cyber hygiene that adversaries could exploit. The advisory reveals common weaknesses—like poor credential…

Learn More
The Journey to Zero Trust

The Journey to Zero Trust

In a Zero Trust world, the perimeter is everywhere—and microsegmentation is key to controlling it. This guidance from CISA and NSA helps agencies implement microsegmentation strategies that limit lateral movement…

Learn More
Digital Identity Guidelines

Digital Identity Guidelines

Establishing trust in digital identities is foundational for secure government and public services. NIST SP 800-63-4 provides the overarching framework for identity proofing, authentication, and federation across digital systems. This…

Learn More