GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Awareness content

Technifying Ventures

Technifying Ventures

This paper explores new methods for improving economic statistics by combining survey responses with administrative and third-party data. By leveraging these linked data sources, researchers can reduce reporting burdens, enhance…

Learn More
Intelligence Reform at 20

Intelligence Reform at 20

Twenty years after major intelligence reforms, joint military intelligence is struggling to keep pace with warfighter needs. Training has leaned heavily on analytic tradecraft standards but often overlooks the joint…

Learn More
CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

CISA and USCG Identify Areas for Cyber Hygiene...

After a proactive threat hunt across multiple federal networks, CISA and its partners identified key gaps in cyber hygiene that adversaries could exploit. The advisory reveals common weaknesses—like poor credential…

Learn More
The Journey to Zero Trust

The Journey to Zero Trust

In a Zero Trust world, the perimeter is everywhere—and microsegmentation is key to controlling it. This guidance from CISA and NSA helps agencies implement microsegmentation strategies that limit lateral movement…

Learn More
Digital Identity Guidelines

Digital Identity Guidelines

Establishing trust in digital identities is foundational for secure government and public services. NIST SP 800-63-4 provides the overarching framework for identity proofing, authentication, and federation across digital systems. This…

Learn More
Digital Identity Guidelines

Digital Identity Guidelines

Verifying identity in the digital age is more than a checkbox—it’s a foundational element of trust. NIST’s updated 800-63A-4 offers detailed guidance for federal agencies and organizations on secure, privacy-respecting…

Learn More
Executive Order 14323: Addressing Threats to the United States by the Government of Brazil

Executive Order 14323: Addressing Threats to the...

Executive Order 14323 kicks off a government-wide overhaul of personnel vetting to strengthen national security and public trust. By streamlining investigations, modernizing policies, and improving data sharing, the order aims…

Learn More
Kids and Teens: Online Addiction is a Thing

Kids and Teens: Online Addiction is a Thing

Online addiction is more than just extra screen time—it can seriously affect teens’ sleep, mental health, and real-world relationships. This guide outlines how constant exposure to social media and gaming…

Learn More
HOW2SPOT Online Predators

HOW2SPOT Online Predators

Online predators often appear friendly and trustworthy, making it difficult for kids and teens to recognize unsafe behavior. This resource helps young people identify red flags—like requests for personal information,…

Learn More
Primary Screening for Passengers

Primary Screening for Passengers

As air travel rebounds to pre-pandemic levels, the TSA is under increasing pressure to screen more passengers for a wider range of threats—quickly and accurately. DHS’s Science and Technology Directorate…

Learn More
Privacy Impact Assessment for the CBP Link

Privacy Impact Assessment for the CBP Link

CBPLink is a cloud-based system used by U.S. Customs and Border Protection to streamline internal communication, case management, and operational collaboration across divisions. This Privacy Impact Assessment ensures that CBPLink’s…

Learn More
Choosing the Right Security Companies in Los Angeles

Choosing the Right Security Companies in Los...

Direct Guard Services stands out among top security companies in Los Angeles, offering professional, reliable protection tailored to your needs. From armed and unarmed guards to mobile patrols, fire watch,…

Learn More
Promising Prevention Practice: Behavioral Threat Assessment and Management

Promising Prevention Practice: Behavioral Threat...

Behavioral Threat Assessment and Management (BTAM) is a structured, community-based strategy for identifying and addressing early warning signs of potential violence. Led by the DHS Center for Prevention Programs and…

Learn More
Dams Sector: Personnel Screening Guide for Owners and Operators

Dams Sector: Personnel Screening Guide for Owners...

The Dams Sector Personnel Screening Guide by CISA provides owners and operators of dams, levees, and related infrastructure with strategies to mitigate insider threats through effective pre-employment screening. It outlines…

Learn More
Roadmap to Innovation in the Dams Sector

Roadmap to Innovation in the Dams Sector

As aging infrastructure and new threats challenge the Dams Sector, innovation is critical to building long-term resilience. This roadmap outlines key research and development priorities—ranging from advanced materials and remote…

Learn More