One of the Department’s top priorities is to ensure the safety and security of the American people. Within the Public Safety and Security mission, we considered lethal threats in the…
Learn MoreIndividuals age 12 or older participate in the National Crime Victimization Survey (NCVS), providing an array of information related to their experiences of crime. This large-scale annual survey, administered by…
Learn MoreLearn more about the consumption inequality before, during, and after the COVID-19 pandemic. We use quarterly data from the U.S. Consumer Expenditure Surveys for this study augmented with additional data…
Learn MoreBehavioral Threat Assessment and Management is a recognized, best practice approach for preventing targeted violence that helps bridge the gap between identifying potential threats and mitigating them—and allows organizations to…
Learn MoreNew methodologies are needed to identify, acquire, preserve, examine, and interpret digital evidence in multi-tenant cloud environments with rapid provisioning, global elasticity, and broad network accessibility. These methodologies will provide…
Learn MoreThe Bugs Framework (BF) is a classification of security bugs and related faults with multi-dimensional weakness and failure taxonomies that features a formal language for the unambiguous specification of security…
Learn MoreThe U.S. Federal Bureau of Investigation (FBI) and the following authoring partners are releasing this Cybersecurity Advisory to highlight cyber espionage activity associated with the Democratic People’s Republic of Korea…
Learn MoreMillions of Americans work in professions that support critical infrastructure. These are positions of special trust and responsibility, which are vital to their organization. Critical Infrastructure owners and operators seeking…
Learn MoreHomeland Security Presidential Directive-12 (HSPD-12) mandated the creation of new standards for interoperable identity credentials for physical and logical access to Federal Government locations and systems. Federal Information Processing Standard…
Learn MoreAs Artificial Intelligence (AI) integrates into more areas of human activity, its potential benefits and risks have been subject to increased public and government scrutiny, highlighting the need for stronger…
Learn MoreZero Trust (ZT) is an “evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.” Unlike a traditional perimeter-based network security…
Learn MoreOperating system (OS) command injection vulnerabilities are a preventable class of vulnerability in software products. Software manufacturers can eliminate them at the source by taking a secure by design approach.…
Learn MoreGovernments are under more pressure to secure the election process than ever before. Disinformation can spread like wildfire amidst the endless back and forth of cyberespionage campaigns from other nation…
Learn MoreThe Department of Homeland Security (DHS) and the U.S. Secret Service offer various programs and resources focused on preparedness and prevention across multiple domains. The U.S. Secret Service National Threat…
Learn MoreIn May 2021, President Biden issued Executive Order 14028, Improving the nation’s Cybersecurity, which makes a significant contribution towards the modernization of cybersecurity defenses by protecting federal networks, improving information-sharing…
Learn More