GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Awareness content

Homeland Threat Assessment 2024

Homeland Threat Assessment 2024

One of the Department’s top priorities is to ensure the safety and security of the American people. Within the Public Safety and Security mission, we considered lethal threats in the…

Learn More
A New Measure of Prevalence for the National Crime Victimization Survey

A New Measure of Prevalence for the National Crime...

Individuals age 12 or older participate in the National Crime Victimization Survey (NCVS), providing an array of information related to their experiences of crime. This large-scale annual survey, administered by…

Learn More
Consumption Inequality During and After the COVID-19 Pandemic

Consumption Inequality During and After the...

Learn more about the consumption inequality before, during, and after the COVID-19 pandemic. We use quarterly data from the U.S. Consumer Expenditure Surveys for this study augmented with additional data…

Learn More
Behavioral Threat Assessment and Management: An Investment in the Future of Targeted Violence Prevention & Public Safety

Behavioral Threat Assessment and Management: An...

Behavioral Threat Assessment and Management is a recognized, best practice approach for preventing targeted violence that helps bridge the gap between identifying potential threats and mitigating them—and allows organizations to…

Learn More
Cloud Computing Forensic Reference Architecture

Cloud Computing Forensic Reference Architecture

New methodologies are needed to identify, acquire, preserve, examine, and interpret digital evidence in multi-tenant cloud environments with rapid provisioning, global elasticity, and broad network accessibility. These methodologies will provide…

Learn More
Bugs Framework: Formalizing Cybersecurity Weaknesses and Vulnerabilites

Bugs Framework: Formalizing Cybersecurity...

The Bugs Framework (BF) is a classification of security bugs and related faults with multi-dimensional weakness and failure taxonomies that features a formal language for the unambiguous specification of security…

Learn More
North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs

North Korea Cyber Group Conducts Global Espionage...

The U.S. Federal Bureau of Investigation (FBI) and the following authoring partners are releasing this Cybersecurity Advisory to highlight cyber espionage activity associated with the Democratic People’s Republic of Korea…

Learn More
Resources for Onboarding and Employment Screening

Resources for Onboarding and Employment Screening

Millions of Americans work in professions that support critical infrastructure. These are positions of special trust and responsibility, which are vital to their organization. Critical Infrastructure owners and operators seeking…

Learn More
Cryptographic Algorithms and Key Sizes for Personal Identity Verification

Cryptographic Algorithms and Key Sizes for...

Homeland Security Presidential Directive-12 (HSPD-12) mandated the creation of new standards for interoperable identity credentials for physical and logical access to Federal Government locations and systems. Federal Information Processing Standard…

Learn More
DHS Report on Reducing the Risks at the Intersection of Artificial Intelligence and Chemical, Biological, Radiological, and Nuclear Threats

DHS Report on Reducing the Risks at the...

As Artificial Intelligence (AI) integrates into more areas of human activity, its potential benefits and risks have been subject to increased public and government scrutiny, highlighting the need for stronger…

Learn More
Advancing Zero Trust Maturity Throughout the Automation and Orchestration Pillar

Advancing Zero Trust Maturity Throughout the...

Zero Trust (ZT) is an “evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.” Unlike a traditional perimeter-based network security…

Learn More
Secure by Design Alert: Eliminating OS Command Injection Vulnerabilities

Secure by Design Alert: Eliminating OS Command...

Operating system (OS) command injection vulnerabilities are a preventable class of vulnerability in software products. Software manufacturers can eliminate them at the source by taking a secure by design approach.…

Learn More
Secure the Election Process with Lookout

Secure the Election Process with Lookout

Governments are under more pressure to secure the election process than ever before. Disinformation can spread like wildfire amidst the endless back and forth of cyberespionage campaigns from other nation…

Learn More
U.S. Department of Homeland Security: Summary of Resources for State, Local, Tribal, Territorial, and Campus Law Enforcement Partners

U.S. Department of Homeland Security: Summary of...

The Department of Homeland Security (DHS) and the U.S. Secret Service offer various programs and resources focused on preparedness and prevention across multiple domains. The U.S. Secret Service National Threat…

Learn More
U.S. Department of Energy Cybersecurity Strategy

U.S. Department of Energy Cybersecurity Strategy

In May 2021, President Biden issued Executive Order 14028, Improving the nation’s Cybersecurity, which makes a significant contribution towards the modernization of cybersecurity defenses by protecting federal networks, improving information-sharing…

Learn More