GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Awareness content

Baltimore Bridge Collapse: Frequently Asked Questions

Baltimore Bridge Collapse: Frequently Asked...

At about 1:30 a.m. on March 26, 2024, the MV Dali, a container ship departing the Port of Baltimore, struck a support tower of the Francis Scott Key Bridge in…

Learn More
Wildfire Sensor Technology

Wildfire Sensor Technology

Wildfires across the U.S. and around the world are becoming more frequent, costly, and dangerous. The Department of Homeland Security Science and Technology Directorate is working with the U.S. Fire…

Learn More
How Congress Can Foster a Digital Single Market in America

How Congress Can Foster a Digital Single Market in...

Technology has transformed virtually every aspect of American life since the country’s founding over two centuries ago. The authors of the Constitution never could have imagined many of the conveniences…

Learn More
How to Defend Against Insider Threat

How to Defend Against Insider Threat

Insider threat and insider risk are critical issues for any company looking to do business with the federal government or stay in business and protect their bottom line. Insider risk…

Learn More
The AI Executive Order and Considerations for Federal Privacy Policy

The AI Executive Order and Considerations for...

With the expanding use of artificial intelligence (AI), Congress and the executive branch may explore whether agency roles and responsibilities relating to privacy have kept pace with emerging technologies and…

Learn More
Ethical Artificial Intelligence: Navigating the Path to Sentience

Ethical Artificial Intelligence: Navigating the...

This paper explores the ethical challenges emerging from artificial intelligence (AI) technology’s rapid advancement. It also examines the risks associated with inaccurate and biased data, emphasizing the need for AI…

Learn More
The Unintended Consequences of Internet Regulation

The Unintended Consequences of Internet Regulation

Over the last few years, there has been an increasing drumbeat for greater internet regulation. But even the most well-intended policy approaches may have completely unexpected negative consequences that may…

Learn More
Privacy First: A Better Way to Address Online Harms

Privacy First: A Better Way to Address Online Harms

State, federal, and international regulators are increasingly concerned about the harms they believe the internet and new technology is causing. The list is long, implicating child safety, journalism, access to…

Learn More
How to Advance Public Safety with Data Management

How to Advance Public Safety with Data Management

With federal, state and local agencies frequently operating independently, the need for efficient and effective communication and coordination has never been more important. The ability to collect, process and manage…

Learn More
Optimized Continuity of Operations (COOP) Strategy Within US Federal Government

Optimized Continuity of Operations (COOP) Strategy...

Mitigate the risk of operational downtime by enhancing your data resiliency per Executive Order. A COOP strategy without being disruptive to your infrastructure. Government entities, not just commercial businesses, are…

Learn More
Measuring the Effectiveness of U.S. Government Security Awareness Programs: A Mixed-Methods Study

Measuring the Effectiveness of U.S. Government...

The National Institute of Standards and Technology provides new insights into how security awareness programs approach and struggle with measuring effectiveness within a yet-to-be-explored context. This understanding can inform government…

Learn More
2022 U.S. Contract Security Market

2022 U.S. Contract Security Market

This annual White Paper marks our 14th year of reporting on the status and direction of the U.S. Contract Security Market. Although the topic headlines remain relatively unchanged from year…

Learn More