{
    "version" : "https://jsonfeed.org/version/1",
    "content" : "topics",
    "type" : "list",
    "title" : "Security |Digital.gov",
    "description": "Security",
    "home_page_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/",
    "count" : "120","feed_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/topics/security/index.json",
    "section" : "topics",
    
    
    "items" : [{"title" :"IT warning banners: How GSA is working to stop unnecessarily frightening users","deck" : "Driving policy changes and improving user experience through M-23-22","summary" : "OMB Memo M-23-22 discourages the use of pop-ups and modals. GSA IT updated security policies so that IT warning banners are presented less intrusively to users.","date" : "2024-08-07T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jessica-marine" : "Jessica Marine"},"topics" : {
        
            "human-centered-design" : "Human-centered design",
            "public-policy" : "Public policy",
            "security" : "Security",
            "terms-of-service" : "Terms of service"
            },"primary_image" : { "uid" : "example-gsa-official-use-system-warning-blue-bg-sm-comp", "alt" :
  "An IT warning banner example alerts user that the system is for official federal government use, is subject to monitoring, and has penalties for unauthorized use.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2024-08-07-it-warning-banners-how-gsa-is-working-to-stop-unnecessarily-frightening-users.md",
      
      "filepath" :"news/2024/08/2024-08-07-it-warning-banners-how-gsa-is-working-to-stop-unnecessarily-frightening-users.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2024/08/2024-08-07-it-warning-banners-how-gsa-is-working-to-stop-unnecessarily-frightening-users.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2024/08/2024-08-07-it-warning-banners-how-gsa-is-working-to-stop-unnecessarily-frightening-users.md","weight" : "1","slug" : "it-warning-banners-how-gsa-is-working-to-stop-unnecessarily-frightening-users","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2024/08/07/it-warning-banners-how-gsa-is-working-to-stop-unnecessarily-frightening-users/"
    },{"title" :"FedRAMP governance","deck" : "The Federal Risk and Authorization Management Program (FedRAMP) has recently updated its governance structure to better serve its customers. Learn about their recently-formed FedRAMP Board, composed of federal executives; the FedRAMP Technical Advisory Group (TAG), composed of technology experts; and updates made to the Federal Security Cloud Advisory Committee (FSCAC). These groups collectively aim to strengthen and expand FedRAMP’s cloud service capabilities.","summary" : "The Federal Risk and Authorization Management Program (FedRAMP) has recently updated its governance structure to better serve its customers. Learn about their recently-formed FedRAMP Board, composed of federal executives; the FedRAMP Technical Advisory Group (TAG), composed of technology experts; and updates made to the Federal Security Cloud Advisory Committee (FSCAC). These groups collectively aim to strengthen and expand FedRAMP’s cloud service capabilities.","date" : "2024-06-04T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "analytics" : "Analytics",
            "best-practices" : "Best practices",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "governance" : "Governance",
            "privacy" : "Privacy",
            "public-policy" : "Public policy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2024-06-11-fedramp-governance.md",
      
      "filepath" :"news/2024/06/2024-06-11-fedramp-governance.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2024/06/2024-06-11-fedramp-governance.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2024/06/2024-06-11-fedramp-governance.md","source" : "fedramp","source_url" : "https://www.fedramp.gov/2024-06-04-fedramp-governance/","weight" : "1","slug" : "fedramp-governance","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2024/06/04/fedramp-governance/"
    },{"title" :"18F practices in action (spoiler: this stuff works)","deck" : "How well do 18F software development practices work? The 18F team reflected on a recent project for the Cybersecurity and Infrastructure Security Agency (CISA) .gov registry to gauge the effectiveness of six recommendations aligned with what they actually did.","summary" : "How well do 18F software development practices work? The 18F team reflected on a recent project for the Cybersecurity and Infrastructure Security Agency (CISA) .gov registry to gauge the effectiveness of six recommendations aligned with what they actually did.","date" : "2024-04-03T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "best-practices" : "Best practices",
            "communication" : "Communication",
            "design" : "Design",
            "human-centered-design" : "Human-centered design",
            "open-source" : "Open source",
            "product-and-project-management" : "Product and project management",
            "robotic-process-automation" : "Robotic process automation",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2024-04-03-18f-practices-in-action-spoiler-this-stuff-works.md",
      
      "filepath" :"news/2024/04/2024-04-03-18f-practices-in-action-spoiler-this-stuff-works.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2024/04/2024-04-03-18f-practices-in-action-spoiler-this-stuff-works.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2024/04/2024-04-03-18f-practices-in-action-spoiler-this-stuff-works.md","source" : "18f","source_url" : "https://18f.gsa.gov/2024/04/03/18f-practices-in-action/","weight" : "1","slug" : "18f-practices-in-action-spoiler-this-stuff-works","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2024/04/03/18f-practices-in-action-spoiler-this-stuff-works/"
    },{"title" :"Social media cyber-vandalism toolkit","deck" : "How to prepare for, recover from, and respond to cyber incidents","summary" : "Cyber-vandalism presents a serious challenge to online-based communication tools. This resource provides information for agency practitioners to prepare for, recover from, and respond to cyber-vandalism.","date" : "2024-02-20T17:50:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"cathryn-camenzind" : "Cathryn Camenzind"},"topics" : {
        
            "security" : "Security",
            "social-media" : "Social media"
            },"branch" : "bc-archive-content-3",
      "filename" :"prepare-recovery-respond-social-media-cyber-vandalism-toolkit.md",
      
      "filepath" :"resources/prepare-recovery-respond-social-media-cyber-vandalism-toolkit.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/prepare-recovery-respond-social-media-cyber-vandalism-toolkit.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/prepare-recovery-respond-social-media-cyber-vandalism-toolkit.md","weight" : "1","aliases" : {"0" : "/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit/"},"slug" : "prepare-recovery-respond-social-media-cyber-vandalism-toolkit","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/prepare-recovery-respond-social-media-cyber-vandalism-toolkit/"
    },{"title" :"Overview of the Privacy Act of 1974 (2020 Edition)","deck" : "This overview, prepared by the Department of Justice’s Office of Privacy and Civil Liberties (OPCL), covers various provisions of the Privacy Act, as addressed by court decisions in cases involving the Act’s disclosure prohibition, its access and amendment provisions, and its agency record-keeping requirements.","summary" : "This overview, prepared by the Department of Justice’s Office of Privacy and Civil Liberties (OPCL), covers various provisions of the Privacy Act, as addressed by court decisions in cases involving the Act’s disclosure prohibition, its access and amendment provisions, and its agency record-keeping requirements.","date" : "2024-02-02T16:54:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"toni-bonitto" : "Toni Bonitto"},"topics" : {
        
            "information-collection" : "Information collection",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"overview-of-the-privacy-act-of-1974-2020-edition.md",
      
      "filepath" :"resources/overview-of-the-privacy-act-of-1974-2020-edition.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/overview-of-the-privacy-act-of-1974-2020-edition.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/overview-of-the-privacy-act-of-1974-2020-edition.md","source" : "doj","source_url" : "https://www.justice.gov/opcl/overview-privacy-act-1974-2020-edition","weight" : "1","aliases" : {"0" : "/resources/overview-of-the-privacy-act-of-1974-2015-edition/"},"slug" : "overview-of-the-privacy-act-of-1974-2020-edition","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/overview-of-the-privacy-act-of-1974-2020-edition/"
    },{"title" :"An introduction to web security","deck" : "Understand how security impacts your website","summary" : "Guidance on meeting security requirements for federal websites.","date" : "2023-12-12T16:14:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "digital-service-delivery" : "Digital service delivery",
            "public-policy" : "Public policy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"an-introduction-to-security.md",
      
      "filepath" :"resources/an-introduction-to-security.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/an-introduction-to-security.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/an-introduction-to-security.md","weight" : "1","slug" : "an-introduction-to-security","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/an-introduction-to-security/"
    },{"title" :"Who is controlling your control system?","deck" : "A starting point for federal information managers","summary" : "Best practices for security administration of control systems and their components. Specific guidance and lessons learned from a federal information system manager.","date" : "2023-10-31T09:39:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"michael-marin" : "Michael Marin"},"topics" : {
        
            "open-source" : "Open source",
            "public-policy" : "Public policy",
            "security" : "Security"
            },"primary_image" : { "uid" : "title-card-who-controls-your-control-systems-chor-muang-istock-getty-images-1423481986-comp", "alt" :
  "Title card with light blue indutrial tech icons on a dark blue background. Title is in light blue, Who is Controlling Your Control Systems?; subtitle is in medium blue, A starting point for federal information managers.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "Chor Muang/iStock via Getty Images", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2023-10-31-who-is-controlling-your-control-system.md",
      
      "filepath" :"news/2023/10/2023-10-31-who-is-controlling-your-control-system.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/10/2023-10-31-who-is-controlling-your-control-system.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/10/2023-10-31-who-is-controlling-your-control-system.md","weight" : "1","slug" : "who-is-controlling-your-control-system","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/10/31/who-is-controlling-your-control-system/"
    },{"title" :"Navigating the NIST industrial control systems overlay","deck" : "How to determine whether overlays apply to your IT system","summary" : "A quick-start user guide for information technology professionals to begin using overlays as a part of their regular security assessments.","date" : "2023-10-25T19:35:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"michael-marin" : "Michael Marin"},"topics" : {
        
            "public-policy" : "Public policy",
            "security" : "Security"
            },"primary_image" : { "uid" : "ics-industrial-control-system-genestro-istock-getty-images-1414920594", "alt" :
  "An illustration of an industrial control system ICS chart with eight icons and keywords in orange and blue on a white background. Going clockwise from the top left: control system, optimisation, efficiency, security, industrial process, centralisation, enterprise, management.", "width" :
  "1200", "height" :
  "628", "credit" :
  "", "caption" :
  "Genestro/iStock via Getty Images Plus", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2023-10-24-navigating-the-nist-industrial-control-systems-overlay.md",
      
      "filepath" :"news/2023/10/2023-10-24-navigating-the-nist-industrial-control-systems-overlay.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/10/2023-10-24-navigating-the-nist-industrial-control-systems-overlay.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/10/2023-10-24-navigating-the-nist-industrial-control-systems-overlay.md","weight" : "1","slug" : "navigating-the-nist-industrial-control-systems-overlay","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/10/25/navigating-the-nist-industrial-control-systems-overlay/"
    },{"title" :"An introduction to ATOs","deck" : "Understand the authority to operate process","summary" : "What is an Authorization to Operate? Before you use software in government, you need to make sure it is allowed. You should know what an ATO is, and when you need one.","date" : "2023-10-18T09:39:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"lindsay-young" : "Lindsay Young"},"topics" : {
        
            "public-policy" : "Public policy",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"primary_image" : { "uid" : "title-card-intro-ato-karpenko-ilia-istock-getty-images-604030034-dg-logo", "alt" :
  "Title card for An introduction to ATOs: Understand the authority to operate process. On the dark gray background, the text on the left is in green, and a circle of line drawings of computer science-related icons on the right are in black, green, and white.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "karpenko_ilia/iStock via Getty Images", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"an-introduction-to-ato.md",
      
      "filepath" :"resources/an-introduction-to-ato.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/an-introduction-to-ato.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/an-introduction-to-ato.md","weight" : "1","slug" : "an-introduction-to-ato","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/an-introduction-to-ato/"
    },{"title" :"The Cybersecurity Battleground: Reflecting on the past, envisioning the future","deck" : "This month marks the 20th anniversary of Cybersecurity Awareness Month, as well as the beginning of a new government fiscal year. In this Great Government through Technology blog post, Laura Stanton, Assistant Commissioner in the Office of Information Technology Category (ITC) of GSA&rsquo;s Federal Acquisition Service (FAS), takes the opportunity to delve into some recent notable cybersecurity events, the broader implications for government agencies, and her vision as GSA continues to play a pivotal role in positioning agencies to create a safer and more secure digital future.","summary" : "This month marks the 20th anniversary of Cybersecurity Awareness Month, as well as the beginning of a new government fiscal year. In this Great Government through Technology blog post, Laura Stanton, Assistant Commissioner in the Office of Information Technology Category (ITC) of the Federal Acquisition Service (FAS), takes the opportunity to delve into some recent notable cybersecurity events, the broader implications for government agencies, and her vision as GSA continues to play a pivotal role in positioning agencies to create a safer and more secure digital future.","date" : "2023-10-18T08:43:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2023-10-25-the-cybersecurity-battleground-reflecting-on-the-past-envisioning-the-future.md",
      
      "filepath" :"news/2023/10/2023-10-25-the-cybersecurity-battleground-reflecting-on-the-past-envisioning-the-future.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/10/2023-10-25-the-cybersecurity-battleground-reflecting-on-the-past-envisioning-the-future.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/10/2023-10-25-the-cybersecurity-battleground-reflecting-on-the-past-envisioning-the-future.md","source" : "gsa","source_url" : "https://gsablogs.gsa.gov/technology/2023/10/18/the-cybersecurity-battleground/","weight" : "1","slug" : "the-cybersecurity-battleground-reflecting-on-the-past-envisioning-the-future","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/10/18/the-cybersecurity-battleground-reflecting-on-the-past-envisioning-the-future/"
    },{"title" :"An introduction to security and privacy controls","deck" : "Explaining NIST’s 800-53 control families for information systems and organizations","summary" : "What do the control families of NIST 800-53 mean? Here&rsquo;s an overview of the control families that create the foundation of federal security compliance.","date" : "2023-10-16T17:52:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"lindsay-young" : "Lindsay Young"},"topics" : {
        
            "public-policy" : "Public policy",
            "security" : "Security"
            },"primary_image" : { "uid" : "intro-security-privacy-controls-nist-800-53-rabbit-photo-istock-getty-images-1203479919", "alt" :
  "Title card with blue and gold padlock icons is for An introduction to security and privacy controls: Explaining NIST’s 800-53 control families for information systems and organizations.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "Rabbit Photo/iStock via Getty Images", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"an-introduction-to-security-and-privacy-controls.md",
      
      "filepath" :"resources/an-introduction-to-security-and-privacy-controls.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/an-introduction-to-security-and-privacy-controls.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/an-introduction-to-security-and-privacy-controls.md","weight" : "1","slug" : "an-introduction-to-security-and-privacy-controls","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/an-introduction-to-security-and-privacy-controls/"
    },{"title" :"New IDManagement.gov is refreshing the conversation about Zero Trust","deck" : "Understanding identity management is now easier than ever.","summary" : "IDmanagement.gov has received an update that makes it easier for users to find exactly what they need.","date" : "2023-10-02T14:53:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"babur-kohy" : "Babur Kohy"},"topics" : {
        
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "user-experience" : "User experience"
            },"primary_image" : { "uid" : "id-management-zero-trust", "alt" :
  "A screen capture of the I.D. Management.gov homepage shows a carousel on the second slide. It reads: Zero Trust concept assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established. Below the text is a blue button with white text that says, Learn more about Zero Trust.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2023-10-02-new-idmanagement-gov-is-refreshing-the-conversation-about-zero-trust.md",
      
      "filepath" :"news/2023/10/2023-10-02-new-idmanagement-gov-is-refreshing-the-conversation-about-zero-trust.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/10/2023-10-02-new-idmanagement-gov-is-refreshing-the-conversation-about-zero-trust.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/10/2023-10-02-new-idmanagement-gov-is-refreshing-the-conversation-about-zero-trust.md","weight" : "1","slug" : "new-idmanagement-gov-is-refreshing-the-conversation-about-zero-trust","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/10/02/new-idmanagement-gov-is-refreshing-the-conversation-about-zero-trust/"
    },{"title" :"Why the American People Deserve a Digital Government","deck" : "OMB released new policy guidance for government that includes a variety of actions and standards to help federal agencies design, develop, and deliver modern websites and digital services. Memo M-23-22, Delivering a Digital-First Public Experience, will make it seamless for the public to obtain government information and services online, and help agencies fully implement the 21st Century Integrated Digital Experience Act (21st Century IDEA).","summary" : "OMB recently released new policy guidance for government that includes a variety of actions and standards to help federal agencies design, develop, and deliver modern websites and digital services. Memo M-23-22, Delivering a Digital-First Public Experience, will make it seamless for the public to obtain government information and services online, and help agencies fully implement the 21st Century Integrated Digital Experience Act (21st Century IDEA).","date" : "2023-09-22T13:26:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "accessibility" : "Accessibility",
            "analytics" : "Analytics",
            "best-practices" : "Best practices",
            "budgeting-and-performance" : "Budgeting and performance",
            "communication" : "Communication",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "design" : "Design",
            "digital-service-delivery" : "Digital service delivery",
            "governance" : "Governance",
            "human-centered-design" : "Human-centered design",
            "mobile" : "Mobile",
            "multilingual" : "Multilingual",
            "plain-language" : "Plain language",
            "privacy" : "Privacy",
            "public-policy" : "Public policy",
            "search" : "Search",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security",
            "social-media" : "Social media",
            "trust" : "Trust",
            "usability" : "Usability",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2023-09-25-why-the-american-people-deserve-a-digital-government.md",
      
      "filepath" :"news/2023/09/2023-09-25-why-the-american-people-deserve-a-digital-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/09/2023-09-25-why-the-american-people-deserve-a-digital-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/09/2023-09-25-why-the-american-people-deserve-a-digital-government.md","source" : "whitehouse","source_url" : "https://www.whitehouse.gov/omb/briefing-room/2023/09/22/why-the-american-people-deserve-a-digital-government/","weight" : "1","slug" : "why-the-american-people-deserve-a-digital-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/09/22/why-the-american-people-deserve-a-digital-government/"
    },{"kicker" : "<no value>","title" :"GSA Shared Service Provider Program Guide","deck" : "Interested in becoming a Shared Service Provider?","summary" : "The newly-released SSP Program Guide was created for commercial vendors interested in becoming a Shared Service Provider.","date" : "2023-07-19T15:15:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"cheryl-jenkins" : "Cheryl Jenkins","tyler-jones" : "Tyler Jones"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "security" : "Security"
            },"primary_image" : { "uid" : "data-security-concept-comp", "alt" :
  "Dark blue data security concepts graphic.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "PlargueDoctor, iStock, Getty Images Plus", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2023-07-19-gsa-shared-service-provider-program-guide.md",
      
      "filepath" :"news/2023/07/2023-07-19-gsa-shared-service-provider-program-guide.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/07/2023-07-19-gsa-shared-service-provider-program-guide.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/07/2023-07-19-gsa-shared-service-provider-program-guide.md","weight" : "1","slug" : "gsa-shared-service-provider-program-guide","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/07/19/gsa-shared-service-provider-program-guide/"
    },{"kicker" : "<no value>","title" :"Digital Autopen Playbook pinpoints how agencies can leverage technology for digital signatures","deck" : "How to create and use a digital autopen for Federal Register documents","summary" : "The Digital Autopen Playbook is a practical guide to help federal agencies create and use a digital autopen for Federal Register documents.","date" : "2023-05-23T15:48:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kenneth-myers" : "Kenneth Myers","tyler-jones" : "Tyler Jones"},"topics" : {
        
            "security" : "Security"
            },"primary_image" : { "uid" : "ficam-digital-autopen-playbook-website", "alt" :
  "Screen capture of the Digital Autopen Playbook website homepage on IDmanagement.gov.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2023-05-23-digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures.md",
      
      "filepath" :"news/2023/05/2023-05-23-digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/05/2023-05-23-digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/05/2023-05-23-digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures.md","weight" : "1","slug" : "digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/05/23/digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures/"
    },{"title" :"Judiciary Launches New Federal Ticket Processing Website","deck" : "Individuals can now pay tickets for minor federal violations more easily, using a redesigned website for the Judiciary’s Central Violations Bureau. The website, officially launched in early May, leverages new technologies and best design practices to improve usability and accessibility across devices, including smart phones.","summary" : "Individuals can now pay tickets for minor federal violations more easily, using a redesigned website for the Judiciary’s Central Violations Bureau. The website, officially launched in early May, leverages new technologies and best design practices to improve usability and accessibility across devices, including smart phones.","date" : "2023-05-02T10:36:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "accessibility" : "Accessibility",
            "design" : "Design",
            "mobile" : "Mobile",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2023-05-09-judiciary-launches-new-federal-ticket-processing-website.md",
      
      "filepath" :"news/2023/05/2023-05-09-judiciary-launches-new-federal-ticket-processing-website.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/05/2023-05-09-judiciary-launches-new-federal-ticket-processing-website.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/05/2023-05-09-judiciary-launches-new-federal-ticket-processing-website.md","source" : "aousc","source_url" : "https://www.uscourts.gov/news/2023/05/02/judiciary-launches-new-federal-ticket-processing-website","weight" : "1","slug" : "judiciary-launches-new-federal-ticket-processing-website","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/05/02/judiciary-launches-new-federal-ticket-processing-website/"
    },{"kicker" : "Identity, Credential, and Access Management","title" :"The Privileged Identity Playbook Guides Management of Privileged User Accounts","deck" : "Securing and Protecting Federal Information Systems","summary" : "The Privileged Identity Playbook is a practical guide to help federal agencies implement and manage a privileged user management function as part of an overall agency ICAM program.","date" : "2022-11-10T10:28:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kenneth-myers" : "Kenneth Myers"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"primary_image" : { "uid" : "cyber-security-and-privacy-golden-sikorka-istock-getty-images-1358866874", "alt" :
  "Illustrated graphic with a cyber security and privacy theme features a laptop, cell phone, password field, security lock, key, cloud, and other elements.", "width" :
  "1200", "height" :
  "628", "credit" :
  "", "caption" :
  "Golden Sikorka, iStock, Getty Images", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2022-11-10-the-privileged-identity-playbook-guides-management-of-privileged-user-accounts.md",
      
      "filepath" :"news/2022/11/2022-11-10-the-privileged-identity-playbook-guides-management-of-privileged-user-accounts.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/11/2022-11-10-the-privileged-identity-playbook-guides-management-of-privileged-user-accounts.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/11/2022-11-10-the-privileged-identity-playbook-guides-management-of-privileged-user-accounts.md","weight" : "1","slug" : "the-privileged-identity-playbook-guides-management-of-privileged-user-accounts","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/11/10/the-privileged-identity-playbook-guides-management-of-privileged-user-accounts/"
    },{"title" :"Cybersecurity Awareness Month","deck" : "This year, the Federal Cyber Workforce Management and Coordinating Working Group, in partnership with OPM, is hosting an interagency contest to promote and expand awareness of the Cyber Professionals Community on Open Opportunities. This community serves as a central hub to post and participate in cyber career development opportunities. Download their Toolkit (1.29 MB, 21 pages) to learn more about the interagency contest that runs October 3rd to December 2nd.","summary" : "This year, the Federal Cyber Workforce Management and Coordinating Working Group, in partnership with OPM, is hosting an interagency contest to promote and expand awareness of the Cyber Professionals Community on Open Opportunities. This community serves as a central hub to post and participate in cyber career development opportunities. Download their Toolkit (1.29 MB, 21 pages) to learn more about the interagency contest that runs October 3rd to December 2nd.","date" : "2022-10-08T11:33:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"lnelson" : "Lisa Nelson"},"topics" : {
        
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2022-10-13-cybersecurity-awareness-month.md",
      
      "filepath" :"news/2022/10/2022-10-13-cybersecurity-awareness-month.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/10/2022-10-13-cybersecurity-awareness-month.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/10/2022-10-13-cybersecurity-awareness-month.md","source" : "open-opps","source_url" : "https://github.com/USAJOBS/openopps-help/blob/66d7ce7e928372cd7f0f99befa28685644d53359/assets/Cyber%20Community%20Campaign%20Toolkit.pdf?raw=true","weight" : "1","slug" : "cybersecurity-awareness-month","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/10/08/cybersecurity-awareness-month/"
    },{"kicker" : "Security","title" :"FedRAMP Launches OSCAL Developer Data Bites Series","deck" : "<strong>FedRAMP Launches OSCAL Developer Data Bites Series</strong>&amp;mndash;FedRAMP is excited to launch an Open Security Controls Assessment Language (OSCAL) Developer Data Bites series! It will cover a variety of technical topics regarding users’ utilization of OSCAL for FedRAMP, FedRAMP automation updates or changes, and open forum conversations with subject matter experts. The first OSCAL Developers Data Bites session will be held on Thursday, September 1, at 12:00 pm, EDT. The series will continue on a bi-weekly basis.","summary" : "","date" : "2022-08-18T09:51:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2022-08-22-fedramp-launches-oscal-developer-data-bites-series.md",
      
      "filepath" :"news/2022/08/2022-08-22-fedramp-launches-oscal-developer-data-bites-series.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/08/2022-08-22-fedramp-launches-oscal-developer-data-bites-series.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/08/2022-08-22-fedramp-launches-oscal-developer-data-bites-series.md","source" : "fedramp","source_url" : "https://www.fedramp.gov/blog/2022-08-18-fedramp-launches-oscal-developer-data-bites-series/","weight" : "1","slug" : "fedramp-launches-oscal-developer-data-bites-series","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/08/18/fedramp-launches-oscal-developer-data-bites-series/"
    },{"title" :"Modernize Your Identity Management Process Through ILM","deck" : "<strong>Modernize Your Identity Management Process Through ILM</strong>—GSA’s Office of Government-wide Policy is pleased to announce the Identity Lifecycle Management (ILM) Playbook, designed for identity program managers, and enterprise and application architects interested in modernizing their identity management process for federal employees. This practical guide helps federal agencies understand how to shift their focus from managing employee access based on credentials to managing the lifecycle of identities as outlined in section III of OMB Memo 19-17. This will help agencies achieve an enterprise Identity, Credential, and Access Management (ICAM) system that is agile enough to support technology modernization and aligns with the Federal Identity, Credential, and Access Management (FICAM) architecture.","summary" : "","date" : "2022-08-12T08:47:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "information-architecture" : "Information architecture",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2022-08-22-modernize-your-identity-management-process-through-ilm.md",
      
      "filepath" :"news/2022/08/2022-08-22-modernize-your-identity-management-process-through-ilm.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/08/2022-08-22-modernize-your-identity-management-process-through-ilm.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/08/2022-08-22-modernize-your-identity-management-process-through-ilm.md","source" : "gsa","source_url" : "https://www.gsa.gov/blog/2022/08/12/modernize-your-identity-management-process-through-ilm","weight" : "1","slug" : "modernize-your-identity-management-process-through-ilm","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/08/12/modernize-your-identity-management-process-through-ilm/"
    },{"kicker" : "Cybersecurity","title" :"FedRAMP Penetration Test Guidance Updates","deck" : "<strong>Penetration Test Guidance Updates</strong>—These updates were made to address the ever-changing cybersecurity landscape. Revisions include updated guidance around existing and new threats as well as addressing attack vectors so they’re in alignment with current best practices. Learn about the four initiatives included in the revision process, and download the new June 2022 PDF.","summary" : "","date" : "2022-07-05T14:16:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2022-07-14-fedramp-penetration-test-guidance-updates.md",
      
      "filepath" :"news/2022/07/2022-07-14-fedramp-penetration-test-guidance-updates.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/07/2022-07-14-fedramp-penetration-test-guidance-updates.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/07/2022-07-14-fedramp-penetration-test-guidance-updates.md","source" : "fedramp","source_url" : "https://www.fedramp.gov/2022-07-05-penetration-test-guidance","weight" : "1","slug" : "fedramp-penetration-test-guidance-updates","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/07/05/fedramp-penetration-test-guidance-updates/"
    },{"kicker" : "Cybersecurity Supply Chain Risk Management","title" :"C-SCRM Acquisition Community of Practice (ACoP) Interact Site","deck" : "<strong>C-SCRM Acquisition Community of Practice (ACoP) Interact Site</strong>—Since the launch of the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP), GSA and the Cybersecurity and Infrastructure Security Agency (CISA) have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the federal government for information communication technology and services (ICTS). To increase C-SCRM awareness and adoption government-wide, the C-SCRM ACoP launched an online collaborative space for the federal government’s IT community and industry to share best practices, ideas, guidance, tools, and expertise needed to implement C-SCRM requirements. Working together as a community and sharing information will help us improve our cybersecurity posture across all levels of government.","summary" : "","date" : "2022-06-30T12:10:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "acquisition" : "Acquisition",
            "communication" : "Communication",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2022-07-18-c-scrm-acquisition-community-of-practice-acop-interact-site.md",
      
      "filepath" :"news/2022/07/2022-07-18-c-scrm-acquisition-community-of-practice-acop-interact-site.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/07/2022-07-18-c-scrm-acquisition-community-of-practice-acop-interact-site.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/07/2022-07-18-c-scrm-acquisition-community-of-practice-acop-interact-site.md","source" : "gsa","source_url" : "https://gsablogs.gsa.gov/technology/2022/06/30/c-scrm-acquisition-community-of-practice-acop-interact-site/","weight" : "1","slug" : "c-scrm-acquisition-community-of-practice-acop-interact-site","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/06/30/c-scrm-acquisition-community-of-practice-acop-interact-site/"
    },{"kicker" : "IT Modernization","title" :"Technology-boosting TMF Investments Deliver Benefits for the American Public","deck" : "The Technology Modernization Fund (TMF) is working to transform the way the government uses technology to deliver for the American public in an equitable, secure and user-friendly way. It strategically invests in priority IT modernization projects that are aligned with the fast pace of changing technology and agency needs. Here are a few examples of how the TMF has invested in multiple projects that are helping many agencies deliver what people need when they need.","summary" : "The Technology Modernization Fund (TMF) is working to transform the way the government uses technology to deliver for the American public in an equitable, secure and user-friendly way. It strategically invests in priority IT modernization projects that are aligned with the fast pace of changing technology and agency needs. Here are a few examples of how the TMF has invested in multiple projects that are helping many agencies deliver what people need when they need.","date" : "2022-05-23T11:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"gsa-blog-team" : "GSA Blog Team"},"topics" : {
        
            "acquisition" : "Acquisition",
            "content-strategy" : "Content strategy",
            "innovation" : "Innovation",
            "open-data" : "Open data",
            "security" : "Security",
            "user-experience" : "User experience"
            },"primary_image" : { "uid" : "tmf-logo-screencap-1200", "alt" :
  "The Technology Modernization Fund (TMF) logo. An American flag-themed shield has three white gears on a field of blue at the top, and verticle red and white stripes. The shield is flanked by two dark blue wings, and the acronym TMF appears below the shield in red capital letters. This is within a white, downward-pointing equilateral triangle on a light gray background.", "width" :
  "1200", "height" :
  "628", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2022-05-31-technology-boosting-tmf-investments-deliver-benefits-for-the-american-public.md",
      
      "filepath" :"news/2022/05/2022-05-31-technology-boosting-tmf-investments-deliver-benefits-for-the-american-public.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/05/2022-05-31-technology-boosting-tmf-investments-deliver-benefits-for-the-american-public.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/05/2022-05-31-technology-boosting-tmf-investments-deliver-benefits-for-the-american-public.md","source_url" : "https://www.gsa.gov/blog/2022/05/23/technology-boosting-tmf-investments-deliver-benefits-for-the-american-public","weight" : "1","slug" : "technology-boosting-tmf-investments-deliver-benefits-for-the-american-public","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/05/23/technology-boosting-tmf-investments-deliver-benefits-for-the-american-public/"
    },{"title" :"Two Years of Federal Student Aid's Virtual Assistant Lead to Lessons Learned and a Clear Vision of the Work Ahead","summary" : "Education&rsquo;s FSA team behind Aidan® shares what they’ve learned over the past two years to help drive improvements and expand the product to a wider range of users.","date" : "2022-05-02T16:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"laura-nadel" : "Laura Nadel","christine-wilkes" : "Christine Wilkes"},"topics" : {
        
            "artificial-intelligence" : "Artificial intelligence",
            "customer-experience" : "Customer experience",
            "design" : "Design",
            "security" : "Security",
            "user-experience" : "User experience"
            },"primary_image" : { "uid" : "fafsa-ask-aidan-owl-logo-in-chat-bubble", "alt" :
  "The Free Application for Federal Student Aid, FAFSA®, Ask Aidan owl logo in bright green, within a chat bubble outline of the same color.", "width" :
  "1200", "height" :
  "628", "credit" :
  "", "caption" :
  "", "format" :
  "jpg" },"branch" : "bc-archive-content-3",
      "filename" :"2022-05-02-two-years-of-federal-student-aid-virtual-assistant-lead-to-lessons-learned-and-a-clear-vision-of-the-work-ahead.md",
      
      "filepath" :"news/2022/05/2022-05-02-two-years-of-federal-student-aid-virtual-assistant-lead-to-lessons-learned-and-a-clear-vision-of-the-work-ahead.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/05/2022-05-02-two-years-of-federal-student-aid-virtual-assistant-lead-to-lessons-learned-and-a-clear-vision-of-the-work-ahead.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/05/2022-05-02-two-years-of-federal-student-aid-virtual-assistant-lead-to-lessons-learned-and-a-clear-vision-of-the-work-ahead.md","weight" : "1","slug" : "two-years-of-federal-student-aid-virtual-assistant-lead-to-lessons-learned-and-a-clear-vision-of-the-work-ahead","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/05/02/two-years-of-federal-student-aid-virtual-assistant-lead-to-lessons-learned-and-a-clear-vision-of-the-work-ahead/"
    },{"title" :"GSA Highlights Progress on Citizen-Facing Digital Services, Cybersecurity in First Year of American Rescue Plan","deck" : "<strong>GSA Highlights Progress on Citizen-Facing Digital Services, Cybersecurity in First Year of American Rescue Plan</strong>—Ahead of the first anniversary of the signing of the American Rescue Plan, legislation which has been the key driver of a strong economic recovery, provided the tools needed to fight the pandemic, and made long-term investments to revitalize the local economy in communities around the country, the U.S. General Services Administration (GSA) highlighted some of the key ways these investments are driving progress on technology modernization and making digital services simpler and more secure across government.","summary" : "summ","date" : "2022-03-10T14:14:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2022-03-16-gsa-highlights-progress-on-citizen-facing-digital-services-cybersecurity-in-first-year-of-american-rescue-plan.md",
      
      "filepath" :"news/2022/03/2022-03-16-gsa-highlights-progress-on-citizen-facing-digital-services-cybersecurity-in-first-year-of-american-rescue-plan.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/03/2022-03-16-gsa-highlights-progress-on-citizen-facing-digital-services-cybersecurity-in-first-year-of-american-rescue-plan.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/03/2022-03-16-gsa-highlights-progress-on-citizen-facing-digital-services-cybersecurity-in-first-year-of-american-rescue-plan.md","source" : "gsa","source_url" : "https://www.gsa.gov/about-us/newsroom/news-releases/gsa-highlights-progress-on-citizenfacing-digital-services-cybersecurity-in-first-year-of-american-rescue-plan-03102022","weight" : "1","slug" : "gsa-highlights-progress-on-citizen-facing-digital-services-cybersecurity-in-first-year-of-american-rescue-plan","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/03/10/gsa-highlights-progress-on-citizen-facing-digital-services-cybersecurity-in-first-year-of-american-rescue-plan/"
    },{"title" :"GSA’s Fedramp Celebrates 10 Years of Impact on Cloud Security","deck" : "<strong>GSA’s FedRAMP Celebrates 10 Years of Impact on Cloud Security</strong>—Today, the Federal Risk and Authorization Management Program (FedRAMP) celebrates its 10-year anniversary. On December 8, 2011, the Office of Management and Budget (OMB) signed a memo establishing FedRAMP to provide a cost-effective, risk-based approach for the adoption and use of cloud services. This landmark reflects GSA and FedRAMP’s commitment to protecting public and federal information through supporting IT modernization and securing IT infrastructure. Over the past ten years, the program has seen an incredible increase in the adoption of FedRAMP-authorized services and will play a critical role in improving the nation&rsquo;s cybersecurity.","date" : "2021-12-08T12:59:00-0500","date_modified" : "2021-12-08T12:59:00-05:00","topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "security" : "Security",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2021-12-15-gsa’s-fedramp-celebrates-10-years-of-impact-on-cloud-security.md",
      
      "filepath" :"news/2021/12/2021-12-15-gsa’s-fedramp-celebrates-10-years-of-impact-on-cloud-security.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2021/12/2021-12-15-gsa’s-fedramp-celebrates-10-years-of-impact-on-cloud-security.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2021/12/2021-12-15-gsa’s-fedramp-celebrates-10-years-of-impact-on-cloud-security.md","source" : "gsa","source_url" : "https://www.gsa.gov/blog/2021/12/08/gsas-fedramp-celebrates-10-years-of-impact-on-cloud-security","weight" : "1","slug" : "gsas-fedramp-celebrates-10-years-of-impact-on-cloud-security","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2021/12/08/gsas-fedramp-celebrates-10-years-of-impact-on-cloud-security/"
    },{"title" :"Unique Vulnerability Counts with Container Scanning","deck" : "<strong>Unique Vulnerability Counts with Container Scanning</strong>—As Cloud Service Providers (CSPs) start to submit their container vulnerability scans in order to meet Container Scanning Guidance requirements, stakeholders monitoring submissions should expect to see large increases in the number of unique vulnerabilities. Learn what&rsquo;s different, and the potential impact for agencies and CSPs.","summary" : "summ","date" : "2021-12-02T17:14:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2021-12-06-unique-vulnerability-counts-with-container-scanning.md",
      
      "filepath" :"news/2021/12/2021-12-06-unique-vulnerability-counts-with-container-scanning.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2021/12/2021-12-06-unique-vulnerability-counts-with-container-scanning.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2021/12/2021-12-06-unique-vulnerability-counts-with-container-scanning.md","source" : "fedramp","source_url" : "https://www.fedramp.gov/2021-12-02-container-scanning/","weight" : "1","slug" : "unique-vulnerability-counts-with-container-scanning","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2021/12/02/unique-vulnerability-counts-with-container-scanning/"
    },{"kicker" : "Privacy","title" :"Security is Everyone's Responsibility: Delivering Secure, Usable Login for Government","deck" : "How login.gov incorporated human centered design and continuous discovery into their product development process to improve the user experience.","summary" : "How login.gov incorporated human centered design and continuous discovery into their product development process to improve the user experience.","date" : "2021-03-02T10:28:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"julia-solorzano" : "Julia Solórzano"},"topics" : {
        
            "design" : "Design",
            "human-centered-design" : "Human-centered design",
            "privacy" : "Privacy",
            "research" : "Research",
            "security" : "Security",
            "user-experience" : "User experience"
            },"primary_image" : { "uid" : "login-gov-launch", "alt" :
  "", "width" :
  "600", "height" :
  "400", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2021-03-02-security-is-everyones-job-delivering-secure-usable-login-for-government.md",
      
      "filepath" :"news/2021/03/2021-03-02-security-is-everyones-job-delivering-secure-usable-login-for-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2021/03/2021-03-02-security-is-everyones-job-delivering-secure-usable-login-for-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2021/03/2021-03-02-security-is-everyones-job-delivering-secure-usable-login-for-government.md","weight" : "1","slug" : "security-is-everyones-job-delivering-secure-usable-login-for-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2021/03/02/security-is-everyones-job-delivering-secure-usable-login-for-government/"
    },{"kicker" : "Design","title" :"The New FedRAMP.gov","deck" : "<strong>The New FedRAMP.gov</strong>—FedRAMP is excited to announce the launch of our revamped website. Thanks to feedback from our partners and stakeholders, the website has an improved user experience that makes FedRAMP information and resources more accessible. The website provides more in-depth information about FedRAMP’s authorization process, enabling agencies, Cloud Service Providers (CSPs), and Third-Party Assessment Organizations (3PAOs) to easily access pertinent information related to their role in the FedRAMP Authorization process.","summary" : "<strong>The New FedRAMP.gov</strong>—FedRAMP is excited to announce the launch of our revamped website. Thanks to feedback from our partners and stakeholders, the website has an improved user experience that makes FedRAMP information and resources more accessible. The website provides more in-depth information about FedRAMP’s authorization process, enabling agencies, Cloud Service Providers (CSPs), and Third-Party Assessment Organizations (3PAOs) to easily access pertinent information related to their role in the FedRAMP Authorization process.","date" : "2021-02-16T17:48:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "design" : "Design",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2021-02-17-the-new-fedramp-gov.md",
      
      "filepath" :"news/2021/02/2021-02-17-the-new-fedramp-gov.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2021/02/2021-02-17-the-new-fedramp-gov.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2021/02/2021-02-17-the-new-fedramp-gov.md","source" : "fedramp","source_url" : "https://www.fedramp.gov/2021-02-16-new-fedrampgov/","weight" : "1","slug" : "the-new-fedramp-gov","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2021/02/16/the-new-fedramp-gov/"
    },{"title" :"A Dashboard for Privacy Offices","deck" : "<strong>A Dashboard for Privacy Offices</strong>—Through work funded by 10x, a team from 18F investigated how technology can help busy privacy offices manage your PII, and make their work more accessible and understandable for the public.","summary" : "Through work funded by 10x, a team from 18F investigated how technology can help busy privacy offices manage your PII, and make their work more accessible and understandable for the public.","date" : "2020-12-15T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "privacy" : "Privacy",
            "research" : "Research",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-12-19-a-dashboard-for-privacy-offices.md",
      
      "filepath" :"news/2020/12/2020-12-19-a-dashboard-for-privacy-offices.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2020/12/2020-12-19-a-dashboard-for-privacy-offices.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2020/12/2020-12-19-a-dashboard-for-privacy-offices.md","source" : "18f","source_url" : "https://18f.gsa.gov/2020/12/15/a-dashboard-for-privacy-offices/","weight" : "1","slug" : "a-dashboard-for-privacy-offices","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2020/12/15/a-dashboard-for-privacy-offices/"
    },{"title" :"TTS Bug Bounty Program: 3 Year Review","deck" : "We&rsquo;re reflecting on our Bug Bounty program for the last 3 years and highlighting some lessons learned.","summary" : "We&rsquo;re reflecting on our Bug Bounty program for the last 3 years and highlighting some lessons learned.","date" : "2020-12-14T10:56:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"alyssa-feola" : "Alyssa Feola","aidan-feldman" : "Aidan Feldman"},"topics" : {
        
            "crowdsourcing-and-citizen-science" : "Crowdsourcing and citizen science",
            "security" : "Security"
            },"primary_image" : { "uid" : "bug-bounty1", "alt" :
  "TTS Bug Bounty: 3 Year Review", "width" :
  "1280", "height" :
  "720", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2020-12-11-tts-bug-bounty-program-3-year-review.md",
      
      "filepath" :"news/2020/12/2020-12-11-tts-bug-bounty-program-3-year-review.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2020/12/2020-12-11-tts-bug-bounty-program-3-year-review.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2020/12/2020-12-11-tts-bug-bounty-program-3-year-review.md","weight" : "1","slug" : "tts-bug-bounty-program-3-year-review","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2020/12/14/tts-bug-bounty-program-3-year-review/"
    },{"kicker" : "Security","title" :"True Crime Detectives: How We Used Free Web Metrics Tools To Uncover a Cybersecurity Incident","deck" : "Join USA.gov as we slowly uncover a conspiracy to scam Americans using fake government websites… and then try to foil the caper!","summary" : "Join USA.gov as we slowly uncover a conspiracy to scam Americans using fake government websites… and then try to foil the caper!","date" : "2020-10-26T00:08:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"david-kaufmann" : "David Kaufmann"},"topics" : {
        
            "analytics" : "Analytics",
            "security" : "Security"
            },"primary_image" : { "uid" : "kaufmann-fraud-404", "alt" :
  "A screenshot of website visitation data shows an increase in page views to a website using USA.gov code to trick visitors into sharing personal information.", "width" :
  "759", "height" :
  "557", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2020-10-24-true-crime-detectives-how-we-used-free-web-metrics-tools-to-uncover-a-cybersecurity-incident.md",
      
      "filepath" :"news/2020/10/2020-10-24-true-crime-detectives-how-we-used-free-web-metrics-tools-to-uncover-a-cybersecurity-incident.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2020/10/2020-10-24-true-crime-detectives-how-we-used-free-web-metrics-tools-to-uncover-a-cybersecurity-incident.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2020/10/2020-10-24-true-crime-detectives-how-we-used-free-web-metrics-tools-to-uncover-a-cybersecurity-incident.md","weight" : "1","slug" : "true-crime-detectives-how-we-used-free-web-metrics-tools-to-uncover-a-cybersecurity-incident","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2020/10/26/true-crime-detectives-how-we-used-free-web-metrics-tools-to-uncover-a-cybersecurity-incident/"
    },{"title" :"Privacy-Preserving Collaboration Using Cryptography","summary" : "In conjunction with her May 2020 presentation, Dr. Emily Shen outlines her work on Secure multi-party computation (MPC), a type of cryptography that allows parties to jointly analyze their data without disclosing it.","date" : "2020-09-29T13:53:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"dr-emily-shen" : "Dr. Emily Shen"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"privacy-preserving-collaboration-using-cryptography.md",
      
      "filepath" :"resources/privacy-preserving-collaboration-using-cryptography.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/privacy-preserving-collaboration-using-cryptography.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/privacy-preserving-collaboration-using-cryptography.md","weight" : "1","slug" : "privacy-preserving-collaboration-using-cryptography","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/privacy-preserving-collaboration-using-cryptography/"
    },{"title" :"","summary" : "Login.gov provides a simple, secure, and private way for the public to access government websites.","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"source_logingov.md",
      
      "filepath" :"sources/source_logingov.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/sources/source_logingov.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/sources/source_logingov.md","weight" : "1","slug" : "logingov","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/sources/logingov/"
    },{"title" :"Digital Dashboard","summary" : "Measures how U.S. government domains are following best practices for federal websites.","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"marina-fox" : "Marina Fox"},"topics" : {
        
            "analytics" : "Analytics",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"service_pulse.md",
      
      "filepath" :"services/service_pulse.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/services/service_pulse.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/services/service_pulse.md","source_url" : "https://www.DigitalDashboard.gov/","weight" : "1","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/services/service_pulse/"
    },{"title" :"M-19-17 Enabling Mission Delivery through Improved Identity, Credential, and Access Management","summary" : "This 2019 memorandum sets forth the federal government&rsquo;s Identity, Credential, and Access Management (ICAM) policy.","date" : "2023-09-06T11:30:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "public-policy" : "Public policy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"m-19-17-enabling-mission-delivery-through-improved-identity-credential-and-access-management.md",
      
      "filepath" :"resources/m-19-17-enabling-mission-delivery-through-improved-identity-credential-and-access-management.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/m-19-17-enabling-mission-delivery-through-improved-identity-credential-and-access-management.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/m-19-17-enabling-mission-delivery-through-improved-identity-credential-and-access-management.md","weight" : "2","slug" : "m-19-17-enabling-mission-delivery-through-improved-identity-credential-and-access-management","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/m-19-17-enabling-mission-delivery-through-improved-identity-credential-and-access-management/"
    },{"title" :"Cloud Smart: Federal Cloud Computing Strategy","deck" : "","summary" : "Founded on three key pillars of successful cloud adoption—security, procurement, and workforce—the Cloud Smart strategy includes 11 action items from the Chief Information Officers (CIO) Council.","date" : "2019-06-24T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "acquisition" : "Acquisition",
            "best-practices" : "Best practices",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"federal-cloud-computing-strategy.md",
      
      "filepath" :"resources/federal-cloud-computing-strategy.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/federal-cloud-computing-strategy.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/federal-cloud-computing-strategy.md","source" : "cio-council","source_url" : "https://cloud.cio.gov/strategy/","weight" : "2","slug" : "federal-cloud-computing-strategy","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/federal-cloud-computing-strategy/"
    },{"kicker" : "Communities of Practice","title" :"Join the Web Managers","deck" : "Share and learn with web and digital services practitioners.","summary" : "Create a better online experience for the public alongside government web content managers.","date" : "2013-11-21T02:31:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"toni-bonitto" : "Toni Bonitto","tori-garten" : "Tori Garten","beth-martin" : "Beth Martin","ruxi-giura" : "Ruxi Giura"},"topics" : {
        
            "accessibility" : "Accessibility",
            "analytics" : "Analytics",
            "communication" : "Communication",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "design" : "Design",
            "digital-service-delivery" : "Digital service delivery",
            "governance" : "Governance",
            "human-centered-design" : "Human-centered design",
            "information-architecture" : "Information architecture",
            "mobile" : "Mobile",
            "multilingual" : "Multilingual",
            "multimedia" : "Multimedia",
            "plain-language" : "Plain language",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "public-policy" : "Public policy",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security",
            "social-media" : "Social media",
            "usability" : "Usability",
            "user-experience" : "User experience"
            },"primary_image" : { "uid" : "communities-card-web-mgrs", "alt" :
  "", "width" :
  "2501", "height" :
  "1307", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"web-managers-forum.md",
      
      "filepath" :"communities/web-managers-forum.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/communities/web-managers-forum.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/communities/web-managers-forum.md","weight" : "2","aliases" : {"0" : "/communities/web-managers-forum/","1" : "/communities/web-managers-forum/web-content-managers-listserv/"},"slug" : "web-content-managers","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/communities/web-content-managers/"
    },{"title" :"Cloud.gov","summary" : "A FedRAMP approved cloud hosting platform that makes it easy for federal agencies to get on the cloud by simplifying procurement, security, and compliance.","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"eddie-tejeda" : "Eddie Tejeda"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"service_cloud.md",
      
      "filepath" :"services/service_cloud.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/services/service_cloud.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/services/service_cloud.md","source_url" : "https://www.cloud.gov/","weight" : "2","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/services/service_cloud/"
    },{"title" :"FedRAMP","summary" : "The Federal Risk and Authorization Management (FedRAMP) is a process that authorizes cloud products and services.","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"ashley-mahan" : "Ashley Mahan"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "product-and-project-management" : "Product and project management",
            "public-policy" : "Public policy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"service_fedramp.md",
      
      "filepath" :"services/service_fedramp.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/services/service_fedramp.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/services/service_fedramp.md","source_url" : "https://www.fedramp.gov/","weight" : "2","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/services/service_fedramp/"
    },{"title" :"Login.gov","summary" : "An identity management service that provides secure and private online access to participating government programs.","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"" : ""},"topics" : {
        
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"service_logingov.md",
      
      "filepath" :"services/service_logingov.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/services/service_logingov.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/services/service_logingov.md","source" : "logingov","source_url" : "https://www.login.gov/","weight" : "2","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/services/service_logingov/"
    },{"title" :"OMB Circular A-130","deck" : "Managing Information as a Strategic Resource","summary" : "Managing Information as a Strategic Resource","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "governance" : "Governance",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"omb-circular-a-130.md",
      
      "filepath" :"resources/omb-circular-a-130.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/omb-circular-a-130.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/omb-circular-a-130.md","source" : "whitehouse","source_url" : "https://www.whitehouse.gov/wp-content/uploads/legacy_drupal_files/omb/circulars/A130/a130revised.pdf","weight" : "2","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/omb-circular-a-130/"
    },{"title" :"An introduction to domain management","deck" : "Understand how and why to manage your domain","summary" : "A .gov domain instantly conveys credibility and trustworthiness, and proper domain management practices ensure that your website is secure and accessible.","date" : "2023-11-28T14:38:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "domain-management" : "Domain management",
            "security" : "Security",
            "trust" : "Trust"
            },"branch" : "bc-archive-content-3",
      "filename" :"an-introduction-to-domain-management.md",
      
      "filepath" :"resources/an-introduction-to-domain-management.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/an-introduction-to-domain-management.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/an-introduction-to-domain-management.md","weight" : "8","slug" : "an-introduction-to-domain-management","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/an-introduction-to-domain-management/"
    },{"title" :"Federal Source Code Summit: Towards a Source Code Community","deck" : "","summary" : "This summit brings together the federal community to share success stories and best practices for utilizing federal source code and open source software, and examine the implementation of the Federal Source Code policy.","date" : "2020-10-08T08:30:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "open-source" : "Open source",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-10-08-federal-source-code-summit-building-coding.md",
      
      "filepath" :"events/2020/10/2020-10-08-federal-source-code-summit-building-coding.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/events/2020/10/2020-10-08-federal-source-code-summit-building-coding.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/events/2020/10/2020-10-08-federal-source-code-summit-building-coding.md","aliases" : {"0" : "/event/2020/04/federal-source-code-summit-building-coding"},"slug" : "federal-source-code-summit-building-coding","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/event/2020/10/08/federal-source-code-summit-building-coding/"
    },{"kicker" : "10x","title" :"10x Project Lightning Talks: 2020","deck" : "","summary" : "10x project teams will demonstrate their work to date and provide brief overviews of each project. We hope that these talks will highlight some of the most interesting work happening in government today and inspire others to submit ideas to 10x.","date" : "2020-06-30T14:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"alicia-rouault" : "Alicia Rouault","ben-judy" : "Ben Judy","gray-brooks" : "Gray Brooks","mike-gintz" : "Mike Gintz","mike-stern" : "Mike Stern","peter-rowland" : "Peter Rowland","sarah-crane" : "Sarah Crane","shaudi-hosseini" : "Shaudi Hosseini"},"topics" : {
        
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-06-30-10x-project-lightning-talks-2020.md",
      
      "filepath" :"events/2020/06/2020-06-30-10x-project-lightning-talks-2020.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/events/2020/06/2020-06-30-10x-project-lightning-talks-2020.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/events/2020/06/2020-06-30-10x-project-lightning-talks-2020.md","slug" : "10x-project-lightning-talks-2020","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/event/2020/06/30/10x-project-lightning-talks-2020/"
    },{"kicker" : "Building trust","title" :"Making .gov More Secure by Default","deck" : "<strong>Making .gov More Secure by Default</strong> — The DotGov Program announces its intent to preload the .gov top-level domain in order to protect .gov site visitors.","summary" : "The DotGov Program announces its intent to preload the .gov top-level domain in order to protect .gov site visitors.","date" : "2020-06-22T15:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-06-22-making-gov-more-secure-by-default.md",
      
      "filepath" :"news/2020/06/2020-06-22-making-gov-more-secure-by-default.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2020/06/2020-06-22-making-gov-more-secure-by-default.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2020/06/2020-06-22-making-gov-more-secure-by-default.md","source" : "dotgov","source_url" : "https://home.dotgov.gov/management/preloading/dotgovhttps/","slug" : "making-gov-more-secure-by-default","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2020/06/22/making-gov-more-secure-by-default/"
    },{"kicker" : "Cloud.gov","title" :"Building for the 21st-Century Web with Federalist","deck" : "","summary" : "Building, deploying, and hosting fast, secure, and compliant federal web sites and applications with Federalist.","date" : "2020-06-16T15:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"david-corwin" : "David Corwin"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-06-16-building-for-21st-century-web-with.md",
      
      "filepath" :"events/2020/06/2020-06-16-building-for-21st-century-web-with.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/events/2020/06/2020-06-16-building-for-21st-century-web-with.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/events/2020/06/2020-06-16-building-for-21st-century-web-with.md","slug" : "building-for-21st-century-web-with","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/event/2020/06/16/building-for-21st-century-web-with/"
    },{"kicker" : "Tools","title" :"Making Critical Government Information More Resilient","deck" : "<strong>Making Critical Government Information More Resilient</strong>—A roundup of steps that federal agencies, and other government entities, can take right now to improve the resilience of their websites and serve information more efficiently to the people that need it.","summary" : "","date" : "2020-06-04T11:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"greg-walker" : "Greg Walker","tlowden" : "Tim Lowden"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-06-04-making-critical-government-information-more-resilient.md",
      
      "filepath" :"news/2020/06/2020-06-04-making-critical-government-information-more-resilient.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2020/06/2020-06-04-making-critical-government-information-more-resilient.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2020/06/2020-06-04-making-critical-government-information-more-resilient.md","source" : "18f","source_url" : "https://18f.gsa.gov/2020/06/04/making-critical-government-information-more-resilient/","slug" : "making-critical-government-information-more-resilient","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2020/06/04/making-critical-government-information-more-resilient/"
    },{"title" :" Dr. Emily Shen on Secure Multi-Party Computation","deck" : "This talk will describe how organizations can collaborate in a privacy-preserving manner using a cryptographic technology called secure multi-party computation.","summary" : "Learn how organizations can securely collaborate using cryptographic technologies.","date" : "2020-05-05T15:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"dr-emily-shen" : "Dr. Emily Shen"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-05-05-dr-emily-shen-on-secure.md",
      
      "filepath" :"events/2020/05/2020-05-05-dr-emily-shen-on-secure.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/events/2020/05/2020-05-05-dr-emily-shen-on-secure.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/events/2020/05/2020-05-05-dr-emily-shen-on-secure.md","slug" : "dr-emily-shen-on-secure","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/event/2020/05/05/dr-emily-shen-on-secure/"
    },{"title" :"Login.gov has surpassed 20 million registered users","deck" : "This week, <strong>Login.gov has surpassed 20 million registered users!</strong> &#x1f389; Congratulations to the team for hitting this milestone while keeping the product simple and secure for the public.","summary" : "This week, Login.gov has surpassed 20 million registered users! Congratulations to the team for hitting this milestone while keeping the product simple and secure for the public.","date" : "2020-01-22T23:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"amos-stone" : "Amos Stone"},"topics" : {
        
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-01-22-logingov-surpassed-has-20-million-registered.md",
      
      "filepath" :"news/2020/01/2020-01-22-logingov-surpassed-has-20-million-registered.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2020/01/2020-01-22-logingov-surpassed-has-20-million-registered.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2020/01/2020-01-22-logingov-surpassed-has-20-million-registered.md","source" : "logingov","source_url" : "https://login.gov/","slug" : "logingov-surpassed-has-20-million-registered","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2020/01/22/logingov-surpassed-has-20-million-registered/"
    },{"title" :"Federal Crowdsourcing Webinar Series, Episode 6: The FedRAMP Ideation","deck" : "","summary" : "Betsy Steele, of the Federal Risk and Authorization Management Program (FedRAMP) team, shares how a crowdsourcing initiative invited the larger cybersecurity community to help inform the next iteration of government’s cloud security authorization program.","date" : "2019-10-30T15:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"bsteele" : "Betsy Steele","tammy-white" : "Tammy White"},"topics" : {
        
            "crowdsourcing-and-citizen-science" : "Crowdsourcing and citizen science",
            "security" : "Security"
            },"primary_image" : { "uid" : "challengegov-card-episode-6", "alt" :
  "A card with the title of the event and an illustration of multi-colored blocks.", "width" :
  "1280", "height" :
  "720", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2019-10-30-federal-crowdsourcing-webinar-series-episode-6-fedramp-ideation.md",
      
      "filepath" :"events/2019/10/2019-10-30-federal-crowdsourcing-webinar-series-episode-6-fedramp-ideation.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/events/2019/10/2019-10-30-federal-crowdsourcing-webinar-series-episode-6-fedramp-ideation.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/events/2019/10/2019-10-30-federal-crowdsourcing-webinar-series-episode-6-fedramp-ideation.md","aliases" : {"0" : "/event/2019/10/08/federal-crowdsourcing-webinar-series-episode-6-fedramp-ideation/"},"slug" : "federal-crowdsourcing-webinar-series-episode-6-fedramp-ideation","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/event/2019/10/30/federal-crowdsourcing-webinar-series-episode-6-fedramp-ideation/"
    },{"title" :"How to Prevent Security Certificates From Expiring During a Lapse in Operations","summary" : "These are the steps that people in government can take to avoid having security certificates expire during a lapse in operations.","date" : "2019-02-07T11:30:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"how-to-prevent-security-certificates-from-expiring-during-shutdown.md",
      
      "filepath" :"resources/how-to-prevent-security-certificates-from-expiring-during-shutdown.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/how-to-prevent-security-certificates-from-expiring-during-shutdown.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/how-to-prevent-security-certificates-from-expiring-during-shutdown.md","slug" : "how-to-prevent-security-certificates-from-expiring-during-a-lapse-in-operations","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/how-to-prevent-security-certificates-from-expiring-during-a-lapse-in-operations/"
    },{"title" :"GSA Steps Up Security for .gov","deck" : "How GSA’s DotGov Program is modernizing the security of .gov to make government websites and systems more secure.","summary" : "GSA’s DotGov Program is modernizing the security of .gov to make government websites and systems more secure.","date" : "2018-10-29T15:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"cameron-dixon" : "Cameron Dixon","marina-fox" : "Marina Fox"},"topics" : {
        
            "domain-management" : "Domain management",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"featured_image" : { "uid" :
  "dotgov-card", "alt" :
  "The new DotGov logo has the .gov top-level domain text in light blue on a dark blue background." },"branch" : "bc-archive-content-3",
      "filename" :"2018-10-29-gsa-steps-up-security-for-dotgov.md",
      
      "filepath" :"news/2018/10/2018-10-29-gsa-steps-up-security-for-dotgov.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2018/10/2018-10-29-gsa-steps-up-security-for-dotgov.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2018/10/2018-10-29-gsa-steps-up-security-for-dotgov.md","slug" : "gsa-steps-up-security-for-dotgov","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2018/10/29/gsa-steps-up-security-for-dotgov/"
    },{"title" :"Conversations on Public Impact: How data trusts can preserve and protect your digital initiatives","deck" : "","summary" : "The Ethics Working Group in GSA&rsquo;s Technology Transformation Service hosts a presentation about data trusts; a legal structure designed to manage data, code, and other digital assets.","date" : "2018-03-21T15:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jeremyzilar" : "Jeremy Zilar"},"topics" : {
        
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2018-03-21-conversations-on-public-impact-how-data-trusts-can-preserve-protect-your-digital-initiatives.md",
      
      "filepath" :"events/2018/03/2018-03-21-conversations-on-public-impact-how-data-trusts-can-preserve-protect-your-digital-initiatives.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/events/2018/03/2018-03-21-conversations-on-public-impact-how-data-trusts-can-preserve-protect-your-digital-initiatives.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/events/2018/03/2018-03-21-conversations-on-public-impact-how-data-trusts-can-preserve-protect-your-digital-initiatives.md","aliases" : {"0" : "/event/conversations-on-public-impact-how-data-trusts-can-preserve-protect-your-digital-initiatives/"},"slug" : "conversations-on-public-impact-how-data-trusts-can-preserve-protect-your-digital-initiatives","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/event/2018/03/21/conversations-on-public-impact-how-data-trusts-can-preserve-protect-your-digital-initiatives/"
    },{"title" :"A Conversation With ITIF About the State of Federal Government Websites","summary" : "Since it’s been nearly six months since their report was released, we wanted to check in with ITIF and see what they’ve learned, what they’ve heard from agencies and what their future plans are to build on this research.","date" : "2017-09-20T11:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"andreanocesigritz" : "Andrea Sigritz"},"topics" : {
        
            "accessibility" : "Accessibility",
            "analytics" : "Analytics",
            "content-strategy" : "Content strategy",
            "design" : "Design",
            "mobile" : "Mobile",
            "plain-language" : "Plain language",
            "research" : "Research",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security",
            "usability" : "Usability",
            "user-experience" : "User experience"
            },"primary_image" : { "uid" : "itif-presentation-title-slide", "alt" :
  "", "width" :
  "600", "height" :
  "338", "credit" :
  "", "caption" :
  "", "format" :
  "jpg" },"branch" : "bc-archive-content-3",
      "filename" :"2017-09-20-a-conversation-with-itif-about-state-federal-government-websites.md",
      
      "filepath" :"news/2017/09/2017-09-20-a-conversation-with-itif-about-state-federal-government-websites.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/09/2017-09-20-a-conversation-with-itif-about-state-federal-government-websites.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/09/2017-09-20-a-conversation-with-itif-about-state-federal-government-websites.md","slug" : "a-conversation-with-itif-about-state-federal-government-websites","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/09/20/a-conversation-with-itif-about-state-federal-government-websites/"
    },{"title" :"The Data Briefing\u0026#58; How Blockchain’s Future Growth Will Affect Federal Agencies","summary" : "Blockchains are an innovative technology which promises to radically change how society conducts business. It will take significant changes in organizational processes before agencies can begin to support blockchains.","date" : "2017-09-13T09:01:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"bbrantley" : "Bill Brantley"},"topics" : {
        
            "artificial-intelligence" : "Artificial intelligence",
            "emerging-tech" : "Emerging tech",
            "open-data" : "Open data",
            "robotic-process-automation" : "Robotic process automation",
            "security" : "Security"
            },"featured_image" : { "uid" :
  "block-chain-network-concept-on-technology-background-monsitj-istock-thinkstock-691338846", "alt" :
  "Block chain network concept on technology background." },"branch" : "bc-archive-content-3",
      "filename" :"2017-09-13-datbriefing-how-blockchain-s-future-growth-will-affect-federal-agencies.md",
      
      "filepath" :"news/2017/09/2017-09-13-datbriefing-how-blockchain-s-future-growth-will-affect-federal-agencies.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/09/2017-09-13-datbriefing-how-blockchain-s-future-growth-will-affect-federal-agencies.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/09/2017-09-13-datbriefing-how-blockchain-s-future-growth-will-affect-federal-agencies.md","slug" : "the-data-briefing-how-blockchains-future-growth-will-affect-federal-agencies","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/09/13/the-data-briefing-how-blockchains-future-growth-will-affect-federal-agencies/"
    },{"title" :"Government Launches Login.Gov to Simplify Access to Public Services","summary" : "Joel Minton, a member of the U.S. Digital Service, is working with GSA’s Technology Transformation Service as the director of login.gov. Tom Mills is the Chief Technology Architect at U.S. Customs and Border Protection. In early April, the U.S. Digital Service and 18F launched login.gov, a single sign-on solution for government websites that will enable","date" : "2017-08-28T09:04:54-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"joel-minton" : "Joel Minton","tom-mills" : "Tom Mills"},"topics" : {
        
            "customer-experience" : "Customer experience",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "user-experience" : "User experience"
            },"featured_image" : { "uid" :
  "login-gov-launch", "alt" :
  "The Login.gov logo." },"branch" : "bc-archive-content-3",
      "filename" :"2017-08-28-government-launches-login-gov-to-simplify-access-to-public-services.md",
      
      "filepath" :"news/2017/08/2017-08-28-government-launches-login-gov-to-simplify-access-to-public-services.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/08/2017-08-28-government-launches-login-gov-to-simplify-access-to-public-services.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/08/2017-08-28-government-launches-login-gov-to-simplify-access-to-public-services.md","slug" : "government-launches-login-gov-to-simplify-access-to-public-services","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/08/28/government-launches-login-gov-to-simplify-access-to-public-services/"
    },{"title" :"NIST Publishes NICE Cybersecurity Workforce Framework","summary" : "Categorizing and Describing Cybersecurity Work for the Nation The National Initiative for Cybersecurity Education (NICE) is pleased to announce the release of Special Publication 800-181, the NICE Cybersecurity Workforce Framework. This publication serves as a fundamental reference to support a workforce capable of meeting an organization’s cybersecurity needs. It provides organizations with a common, consistent","date" : "2017-08-22T12:00:51-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"nist" : "National Institute of Standards and Technology Team"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "open-data" : "Open data",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-08-22-nist-publishes-nice-cybersecurity-workforce-framework.md",
      
      "filepath" :"news/2017/08/2017-08-22-nist-publishes-nice-cybersecurity-workforce-framework.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/08/2017-08-22-nist-publishes-nice-cybersecurity-workforce-framework.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/08/2017-08-22-nist-publishes-nice-cybersecurity-workforce-framework.md","slug" : "nist-publishes-nice-cybersecurity-workforce-framework","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/08/22/nist-publishes-nice-cybersecurity-workforce-framework/"
    },{"title" :"NIST Crafts Next-Generation Safeguards for Information Systems and the Internet of Things","summary" : "Information systems—from communications platforms to internet-connected devices—require both security and privacy safeguards to work successfully and protect users in our increasingly complex and interconnected world. Toward these ends, the National Institute of Standards and Technology (NIST) has issued a new draft revision of its widely used Special Publication (SP) 800-53, Security and Privacy Controls for Information","date" : "2017-08-22T02:00:13-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"nist" : "National Institute of Standards and Technology Team"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-08-22-nist-crafts-next-generation-safeguards-for-information-systems-and-the-internet-of-things.md",
      
      "filepath" :"news/2017/08/2017-08-22-nist-crafts-next-generation-safeguards-for-information-systems-and-the-internet-of-things.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/08/2017-08-22-nist-crafts-next-generation-safeguards-for-information-systems-and-the-internet-of-things.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/08/2017-08-22-nist-crafts-next-generation-safeguards-for-information-systems-and-the-internet-of-things.md","slug" : "nist-crafts-next-generation-safeguards-for-information-systems-and-the-internet-of-things","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/08/22/nist-crafts-next-generation-safeguards-for-information-systems-and-the-internet-of-things/"
    },{"title" :"The Cutting EDGE\u0026#58; New Virtual Training Prepares First Responders for Active Shooter Incidents","summary" : "Amidst the chaos of an active shooter event, preparedness is key to a seamless, swift and effective response—and a new video game funded by the Department of Homeland Security (DHS) Science and Technology Directorate and the U.S. Army Research Laboratory just might do the trick.","date" : "2017-08-03T12:14:24-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"department-of-homeland-security" : "U.S. Department of Homeland Security"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "emerging-tech" : "Emerging tech",
            "multimedia" : "Multimedia",
            "research" : "Research",
            "security" : "Security",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-08-03-cutting-edge-new-virtual-training-prepares-first-responders-for-active-shooter-incidents.md",
      
      "filepath" :"news/2017/08/2017-08-03-cutting-edge-new-virtual-training-prepares-first-responders-for-active-shooter-incidents.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/08/2017-08-03-cutting-edge-new-virtual-training-prepares-first-responders-for-active-shooter-incidents.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/08/2017-08-03-cutting-edge-new-virtual-training-prepares-first-responders-for-active-shooter-incidents.md","slug" : "cutting-edge-new-virtual-training-prepares-first-responders-for-active-shooter-incidents","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/08/03/cutting-edge-new-virtual-training-prepares-first-responders-for-active-shooter-incidents/"
    },{"title" :"\u0026#8216;Cybersecuring\u0026#8217; the Internet of Things","summary" : "I recently had the chance to talk with the legendary Vint Cerf, one of the founding fathers of the internet. We had a wide-ranging discussion about the past, present and future of the internet, network security and what it would take to successfully, safely and reliably merge the digital and physical worlds, a concept known","date" : "2017-06-29T02:00:47-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"donna-dodson" : "Donna Dodson"},"topics" : {
        
            "best-practices" : "Best practices",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-06-29-cybersecuring-the-internet-of-things.md",
      
      "filepath" :"news/2017/06/2017-06-29-cybersecuring-the-internet-of-things.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/06/2017-06-29-cybersecuring-the-internet-of-things.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/06/2017-06-29-cybersecuring-the-internet-of-things.md","slug" : "cybersecuring-the-internet-of-things","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/06/29/cybersecuring-the-internet-of-things/"
    },{"title" :"FedRAMP 5th Anniversary","summary" : "This week we are excited to celebrate FedRAMP’s fifth birthday! The program has come a long way over the past five years, as we have been able to grow and transform the program to continue to meet the evolving needs of our partners .","date" : "2017-06-13T14:10:23-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"fedramp" : "FedRAMP"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-06-13-fedramp-5th-anniversary.md",
      
      "filepath" :"news/2017/06/2017-06-13-fedramp-5th-anniversary.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/06/2017-06-13-fedramp-5th-anniversary.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/06/2017-06-13-fedramp-5th-anniversary.md","slug" : "fedramp-5th-anniversary","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/06/13/fedramp-5th-anniversary/"
    },{"title" :"FICAM’s New Resources Help Solve Government’s Identity Management Challenge","summary" : "In today’s digital world, it’s imperative that government agencies safeguard citizens’ physical and electronic security. In the world of Federal IT, adopting and advancing cybersecurity can’t be accomplished in one day, or by one agency. Federal agencies must work together to tackle complex problems and stay ahead of evolving network threats. The Federal Identity, Credential,","date" : "2017-06-12T10:11:06-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jim-sheire" : "Jim Sheire"},"topics" : {
        
            "mobile" : "Mobile",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-06-12-ficams-new-resources-help-solve-governments-identity-management-challenge.md",
      
      "filepath" :"news/2017/06/2017-06-12-ficams-new-resources-help-solve-governments-identity-management-challenge.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/06/2017-06-12-ficams-new-resources-help-solve-governments-identity-management-challenge.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/06/2017-06-12-ficams-new-resources-help-solve-governments-identity-management-challenge.md","slug" : "ficams-new-resources-help-solve-governments-identity-management-challenge","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/06/12/ficams-new-resources-help-solve-governments-identity-management-challenge/"
    },{"title" :"Hybrid Cloud: A Key to Phasing in New Technologies","summary" : "Like any newer technology, cloud computing has faced adoption challenges. IT managers understand the huge potential efficiency improvements and savings that cloud computing can bring to their agencies, but also have questions about security, compatibility, and funding. With these concerns and without a clear path to cloud computing, many agencies continue to maintain on-premises solutions.","date" : "2017-06-08T11:00:38-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"mary-davie" : "Mary Davie"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-06-08-hybrid-cloud-a-key-to-phasing-in-new-technologies.md",
      
      "filepath" :"news/2017/06/2017-06-08-hybrid-cloud-a-key-to-phasing-in-new-technologies.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/06/2017-06-08-hybrid-cloud-a-key-to-phasing-in-new-technologies.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/06/2017-06-08-hybrid-cloud-a-key-to-phasing-in-new-technologies.md","slug" : "hybrid-cloud-a-key-to-phasing-in-new-technologies","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/06/08/hybrid-cloud-a-key-to-phasing-in-new-technologies/"
    },{"title" :"Federalist Is out of Beta and Open for Business","summary" : "If you’re a program manager or a federal web developer you’ve probably been given a seemingly simple task: Create a basic website as part of a new initiative at your agency. The hardest part is often not crafting the content or designing the prototype, but getting the security and privacy compliance in order to launch","date" : "2017-06-05T11:00:17-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"will-slack" : "Will Slack","jonathan-hooper" : "Jonathan Hooper"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "design" : "Design",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-06-05-federalist-is-out-of-beta-and-open-for-business.md",
      
      "filepath" :"news/2017/06/2017-06-05-federalist-is-out-of-beta-and-open-for-business.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/06/2017-06-05-federalist-is-out-of-beta-and-open-for-business.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/06/2017-06-05-federalist-is-out-of-beta-and-open-for-business.md","slug" : "federalist-is-out-of-beta-and-open-for-business","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/06/05/federalist-is-out-of-beta-and-open-for-business/"
    },{"title" :"From Launch to Landing: How NASA Took Control of Its HTTPS Mission","summary" : "18F Editor’s note: This is a guest post by Karim Said of NASA. Karim was instrumental in NASA’s successful HTTPS and HSTS migration, and we’re happy to help Karim share the lessons NASA learned from that process. In 2015, the White House Office of Management and Budget released M-15-13, a “Policy to Require Secure Connections","date" : "2017-05-26T12:00:50-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"karim-said" : "Karim Said"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-05-26-from-launch-to-landing-how-nasa-took-control-of-its-https-mission.md",
      
      "filepath" :"news/2017/05/2017-05-26-from-launch-to-landing-how-nasa-took-control-of-its-https-mission.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/05/2017-05-26-from-launch-to-landing-how-nasa-took-control-of-its-https-mission.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/05/2017-05-26-from-launch-to-landing-how-nasa-took-control-of-its-https-mission.md","slug" : "from-launch-to-landing-how-nasa-took-control-of-its-https-mission","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/05/26/from-launch-to-landing-how-nasa-took-control-of-its-https-mission/"
    },{"title" :"The Next Step Towards a Bug Bounty Program for the Technology Transformation Service","summary" : "We took a big step toward creating a bug bounty program for our agency by issuing an award to HackerOne for a Software-as-a-Service bug-reporting platform.","date" : "2017-05-18T02:00:07-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"eric-mill" : "Eric Mill","omid-ghaffari-tabrizi" : "Omid Ghaffari-Tabrizi","waldo-jaquith" : "Waldo Jaquith"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-05-18-the-next-step-towards-a-bug-bounty-program-for-the-technology-transformation-service.md",
      
      "filepath" :"news/2017/05/2017-05-18-the-next-step-towards-a-bug-bounty-program-for-the-technology-transformation-service.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/05/2017-05-18-the-next-step-towards-a-bug-bounty-program-for-the-technology-transformation-service.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/05/2017-05-18-the-next-step-towards-a-bug-bounty-program-for-the-technology-transformation-service.md","slug" : "the-next-step-towards-a-bug-bounty-program-for-the-technology-transformation-service","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/05/18/the-next-step-towards-a-bug-bounty-program-for-the-technology-transformation-service/"
    },{"title" :"Cybersecurity: Protecting Manufacturing Technology and Innovation","summary" : "Recently a segment on my favorite morning news program stopped me in my tracks. The young and attractive hosts (why are they always so young and attractive?) were demonstrating new appliances including a smart refrigerator. The fridge was equipped with all kinds of high-tech features including touch screen displays, a camera inside that allows you","date" : "2017-05-04T15:00:45-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"pat-toth" : "Pat Toth"},"topics" : {
        
            "best-practices" : "Best practices",
            "content-strategy" : "Content strategy",
            "emerging-tech" : "Emerging tech",
            "innovation" : "Innovation",
            "open-data" : "Open data",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-05-04-cybersecurity-protecting-manufacturing-technology-and-innovation.md",
      
      "filepath" :"news/2017/05/2017-05-04-cybersecurity-protecting-manufacturing-technology-and-innovation.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/05/2017-05-04-cybersecurity-protecting-manufacturing-technology-and-innovation.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/05/2017-05-04-cybersecurity-protecting-manufacturing-technology-and-innovation.md","slug" : "cybersecurity-protecting-manufacturing-technology-and-innovation","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/05/04/cybersecurity-protecting-manufacturing-technology-and-innovation/"
    },{"title" :"DHS Study on Mobile Device Security","summary" : "The Department of Homeland Security (DHS) has submitted a report to Congress that details current and emerging threats to the Federal government’s use of mobile devices and recommends security improvements to the mobile device ecosystem. The DHS Science and Technology Directorate (S&amp;T) led the study in coordination with the National Institute of Standards and Technology","date" : "2017-05-04T12:00:43-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"department-of-homeland-security" : "U.S. Department of Homeland Security"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "mobile" : "Mobile",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-05-04-dhs-study-on-mobile-device-security.md",
      
      "filepath" :"news/2017/05/2017-05-04-dhs-study-on-mobile-device-security.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/05/2017-05-04-dhs-study-on-mobile-device-security.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/05/2017-05-04-dhs-study-on-mobile-device-security.md","slug" : "dhs-study-on-mobile-device-security","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/05/04/dhs-study-on-mobile-device-security/"
    },{"title" :"DotGov Domain Registration Program to Provide HTTPS Preloading in May","summary" : "Effective May 15, 2017, GSA’s DotGov Domain Registration Program will begin providing HSTS Preloading services for federal agencies. This new service helps ensure that visitor communication with .gov websites is not modified or compromised, and hostile networks cannot inject malware, tracking beacons, or otherwise monitor or change visitor interactions online.","date" : "2017-04-12T14:19:47-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"marina-fox" : "Marina Fox","eric-mill" : "Eric Mill"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "domain-management" : "Domain management",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"primary_image" : { "uid" : "https-padlock-weerapatkiatdumrong-istock-thinkstock-520737069-comp", "alt" :
  "A small metal padlock rests on a keyboard to represent HTTPS; hypertext transfer protocol secure.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "weerapatkiatdumrong, iStock, Thinkstock", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2017-04-12-dotgov-domain-registration-program-to-provide-https-preloading-in-may.md",
      
      "filepath" :"news/2017/04/2017-04-12-dotgov-domain-registration-program-to-provide-https-preloading-in-may.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/04/2017-04-12-dotgov-domain-registration-program-to-provide-https-preloading-in-may.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/04/2017-04-12-dotgov-domain-registration-program-to-provide-https-preloading-in-may.md","slug" : "dotgov-domain-registration-program-to-provide-https-preloading-in-may","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/04/12/dotgov-domain-registration-program-to-provide-https-preloading-in-may/"
    },{"title" :"To Get Things Done, You Need Great, Secure Tools","summary" : "To folks new to government, one of the most surprising differences between our work and work in the private sector are the barriers in accessing commercially available software, and commercially available Software-as-a-Service (SaaS) in particular. There are good reasons for these barriers: the government places premiums on considerations such as security, privacy, accessibility, license management,","date" : "2017-04-11T11:00:12-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"v-david-zvenyach" : "Dave Zvenyach"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-04-11-to-get-things-done-you-need-great-secure-tools.md",
      
      "filepath" :"news/2017/04/2017-04-11-to-get-things-done-you-need-great-secure-tools.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/04/2017-04-11-to-get-things-done-you-need-great-secure-tools.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/04/2017-04-11-to-get-things-done-you-need-great-secure-tools.md","slug" : "to-get-things-done-you-need-great-secure-tools","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/04/11/to-get-things-done-you-need-great-secure-tools/"
    },{"title" :"New ITIF Report Inspires a Closer Look at Website Performance and Security—Here Is Where to Begin","summary" : "The Information Technology &amp; Innovation Foundation (ITIF) recently published a report, Benchmarking U.S. Government Websites, that looks at the performance, security, and accessibility of the top 297 government websites.","date" : "2017-03-24T11:02:04-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"digitalgov-team" : "Digital.gov Team"},"topics" : {
        
            "accessibility" : "Accessibility",
            "analytics" : "Analytics",
            "content-strategy" : "Content strategy",
            "design" : "Design",
            "human-centered-design" : "Human-centered design",
            "mobile" : "Mobile",
            "open-data" : "Open data",
            "plain-language" : "Plain language",
            "product-and-project-management" : "Product and project management",
            "research" : "Research",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security",
            "software-engineering" : "Software engineering",
            "usability" : "Usability",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2017-03-24-new-itif-report-inspires-a-closer-look-at-website-performance-and-security-here-is-where-to-begin.md",
      
      "filepath" :"news/2017/03/2017-03-24-new-itif-report-inspires-a-closer-look-at-website-performance-and-security-here-is-where-to-begin.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/03/2017-03-24-new-itif-report-inspires-a-closer-look-at-website-performance-and-security-here-is-where-to-begin.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/03/2017-03-24-new-itif-report-inspires-a-closer-look-at-website-performance-and-security-here-is-where-to-begin.md","slug" : "new-itif-report-inspires-a-closer-look-at-website-performance-and-security-here-is-where-to-begin","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/03/24/new-itif-report-inspires-a-closer-look-at-website-performance-and-security-here-is-where-to-begin/"
    },{"title" :"Automatic HTTPS Enforcement for New Executive Branch .gov Domains","summary" : "HTTPS is a necessary baseline for security on the modern web. Non-secure HTTP connections lack integrity protection, and can be used to attack citizens, foreign nationals, and government staff. HTTPS provides increased confidentiality, authenticity, and integrity that mitigate these attacks.","date" : "2017-01-19T12:00:30-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"eric-mill" : "Eric Mill","marina-fox" : "Marina Fox"},"topics" : {
        
            "analytics" : "Analytics",
            "content-strategy" : "Content strategy",
            "domain-management" : "Domain management",
            "governance" : "Governance",
            "product-and-project-management" : "Product and project management",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security"
            },"primary_image" : { "uid" : "dot-gov-tld-wood-block-marekuliasz-istock-gettyimages-476434043-1-comp", "alt" :
  "The dot gov internet domain, network address for government, in vintage letterpress wood type on light-colored ceramic tile background.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "marekuliasz/iStock via Getty Images", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2017-01-19-automatic-https-enforcement-for-new-executive-branch-gov-domains.md",
      
      "filepath" :"news/2017/01/2017-01-19-automatic-https-enforcement-for-new-executive-branch-gov-domains.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2017/01/2017-01-19-automatic-https-enforcement-for-new-executive-branch-gov-domains.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2017/01/2017-01-19-automatic-https-enforcement-for-new-executive-branch-gov-domains.md","slug" : "automatic-https-enforcement-for-new-executive-branch-gov-domains","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2017/01/19/automatic-https-enforcement-for-new-executive-branch-gov-domains/"
    },{"title" :"Laying the Foundation for a More Secure, Modern Government","summary" : "Summary: Building on efforts to boost Federal cybersecurity &amp; as part of National Cybersecurity Awareness Month, today we’re releasing a proposed guidance to modernize Federal IT. America’s spirit of ingenuity and entrepreneurship created the world’s most innovative economy and keeps us dominant in today’s digital age. Indeed, in 1985 about 2,000 people used the Internet;","date" : "2016-10-28T03:00:16-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tony-scott" : "Tony Scott"},"topics" : {
        
            "best-practices" : "Best practices",
            "budgeting-and-performance" : "Budgeting and performance",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "governance" : "Governance",
            "innovation" : "Innovation",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-10-28-laying-the-foundation-for-a-more-secure-modern-government.md",
      
      "filepath" :"news/2016/10/2016-10-28-laying-the-foundation-for-a-more-secure-modern-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/10/2016-10-28-laying-the-foundation-for-a-more-secure-modern-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/10/2016-10-28-laying-the-foundation-for-a-more-secure-modern-government.md","slug" : "laying-the-foundation-for-a-more-secure-modern-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/10/28/laying-the-foundation-for-a-more-secure-modern-government/"
    },{"title" :"The Data Briefing: Help Predict the Future of Federal Government Data","summary" : "In December, I plan to write two postings detailing a scenario analysis for the next ten years of the Federal government’s data technologies. Governments are on the cusp of amazing technological advances propelled by artificial intelligence, blockchain technologies, and the Internet of Things. Also, governments will face new challenges such as the recent global cyber","date" : "2016-10-26T13:00:55-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"bbrantley" : "Bill Brantley"},"topics" : {
        
            "analytics" : "Analytics",
            "artificial intelligence" : "Artificial intelligence",
            "best-practices" : "Best practices",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "emerging-tech" : "Emerging tech",
            "innovation" : "Innovation",
            "mobile" : "Mobile",
            "multimedia" : "Multimedia",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "research" : "Research",
            "security" : "Security",
            "social-media" : "Social media",
            "software-engineering" : "Software engineering",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-10-26-the-data-briefing-help-predict-the-future-of-federal-government-data.md",
      
      "filepath" :"news/2016/10/2016-10-26-the-data-briefing-help-predict-the-future-of-federal-government-data.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/10/2016-10-26-the-data-briefing-help-predict-the-future-of-federal-government-data.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/10/2016-10-26-the-data-briefing-help-predict-the-future-of-federal-government-data.md","slug" : "the-data-briefing-help-predict-the-future-of-federal-government-data","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/10/26/the-data-briefing-help-predict-the-future-of-federal-government-data/"
    },{"title" :"Federal Cybersecurity Challenges","summary" : "These days, when you turn on the news you almost always see another hack, leak, or breach putting sensitive information at risk. But we’ve been focusing on keeping federal agency information systems secure for a long time. For October’s Cybersecurity Awareness Month, the WatchBlog takes a look at federal cybersecurity challenges.  What is the threat?","date" : "2016-10-25T10:00:09-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"gao-watchblog" : "GAO WatchBlog"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-10-25-federal-cybersecurity-challenges.md",
      
      "filepath" :"news/2016/10/2016-10-25-federal-cybersecurity-challenges.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/10/2016-10-25-federal-cybersecurity-challenges.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/10/2016-10-25-federal-cybersecurity-challenges.md","slug" : "federal-cybersecurity-challenges","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/10/25/federal-cybersecurity-challenges/"
    },{"title" :"Further Enhancing the Federal Government’s Privacy Practices","summary" : "Summary: The Office of Management and Budget is releasing updated guidance on the role and designation of Senior Agency Officials for Privacy. The digital economy has transformed how citizens interact with their Government. Government services related to immigration, student loans, health insurance, and veterans’ benefits are just a sample of the services now available online.","date" : "2016-09-30T11:30:06-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"marc-groman" : "Marc Groman"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "governance" : "Governance",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-09-30-further-enhancing-the-federal-governments-privacy-practices.md",
      
      "filepath" :"news/2016/09/2016-09-30-further-enhancing-the-federal-governments-privacy-practices.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/09/2016-09-30-further-enhancing-the-federal-governments-privacy-practices.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/09/2016-09-30-further-enhancing-the-federal-governments-privacy-practices.md","slug" : "further-enhancing-the-federal-governments-privacy-practices","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/09/30/further-enhancing-the-federal-governments-privacy-practices/"
    },{"title" :"Vendors and Government Strengthen Partnership at Technology Industry Day","summary" : "On September 8, 2016, the General Services Administration (GSA) held a Technology Industry Day. We’re thrilled that more than 300 members of the technology industry in person and via the live stream were able to join us for this first step towards a closer partnership and more open lines of communication about how we can work together to transform federal technology.","date" : "2016-09-30T10:00:02-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"andre-francisco" : "Andre Francisco"},"topics" : {
        
            "budgeting-and-performance" : "Budgeting and performance",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "innovation" : "Innovation",
            "open-data" : "Open data",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-09-30-vendors-and-government-strengthen-partnership-at-technology-industry-day.md",
      
      "filepath" :"news/2016/09/2016-09-30-vendors-and-government-strengthen-partnership-at-technology-industry-day.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/09/2016-09-30-vendors-and-government-strengthen-partnership-at-technology-industry-day.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/09/2016-09-30-vendors-and-government-strengthen-partnership-at-technology-industry-day.md","slug" : "vendors-and-government-strengthen-partnership-at-technology-industry-day","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/09/30/vendors-and-government-strengthen-partnership-at-technology-industry-day/"
    },{"title" :"GSA Hosts First-Ever Technology Industry Day in Washington, D.C.","summary" : "On September 8, 2016 Administrator Denise Turner Roth of the U.S. General Services Administration (GSA) hosted the first-ever Technology Industry Day to provide a better understanding of GSA’s path to improve the government’s outdated technology systems. Private industry and government came together to find best ways to deliver 21st century technology to federal agencies.","date" : "2016-09-26T10:00:53-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"gsa-blog-team" : "GSA Blog Team"},"topics" : {
        
            "budgeting-and-performance" : "Budgeting and performance",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "innovation" : "Innovation",
            "open-data" : "Open data",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-09-26-gsa-hosts-first-ever-technology-industry-day-in-washington-d-c.md",
      
      "filepath" :"news/2016/09/2016-09-26-gsa-hosts-first-ever-technology-industry-day-in-washington-d-c.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/09/2016-09-26-gsa-hosts-first-ever-technology-industry-day-in-washington-d-c.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/09/2016-09-26-gsa-hosts-first-ever-technology-industry-day-in-washington-d-c.md","slug" : "gsa-hosts-first-ever-technology-industry-day-in-washington-d-c","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/09/26/gsa-hosts-first-ever-technology-industry-day-in-washington-d-c/"
    },{"title" :"No Longer an Idea of the Future, Artificial Intelligence Is Here and You Are Probably Already Using It","summary" : "It might surprise some of you to know that artificial intelligence (AI) is already in use and a routine part of our daily lives, but we leverage this technology when we use our smartphones or other devices to ask Apple’s Siri, Microsoft’s Cortana, Google Now, or Amazon’s Alexa a question to get the facts or data we","date" : "2016-09-15T11:00:12-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"christen-geiler" : "Christen Geiler"},"topics" : {
        
            "analytics" : "Analytics",
            "artificial-intelligence" : "Artificial intelligence",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "innovation" : "Innovation",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "research" : "Research",
            "security" : "Security",
            "software-engineering" : "Software engineering",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-09-15-no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it.md",
      
      "filepath" :"news/2016/09/2016-09-15-no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/09/2016-09-15-no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/09/2016-09-15-no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it.md","slug" : "no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/09/15/no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it/"
    },{"title" :"DNSSEC vs. Elastic Load Balancers: the Zone Apex Problem","summary" : "This is the final post in the 5-part series, The Right Tools for the Job: Re-Hosting DigitalGov Search to a Dynamic Infrastructure Environment. Federal websites are required to implement DNSSEC, which relies on knowing exactly what server is responding to a request. In Amazon Web Services (AWS), the problem of unreliable servers is solved by","date" : "2016-09-12T13:00:09-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"nick-marden" : "Nick Marden"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "search" : "Search",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-09-12-dnssec-vs-elastic-load-balancers-the-zone-apex-problem.md",
      
      "filepath" :"news/2016/09/2016-09-12-dnssec-vs-elastic-load-balancers-the-zone-apex-problem.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/09/2016-09-12-dnssec-vs-elastic-load-balancers-the-zone-apex-problem.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/09/2016-09-12-dnssec-vs-elastic-load-balancers-the-zone-apex-problem.md","slug" : "dnssec-vs-elastic-load-balancers-the-zone-apex-problem","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/09/12/dnssec-vs-elastic-load-balancers-the-zone-apex-problem/"
    },{"title" :"Sign up for the Technology Industry Day","summary" : "On September 8, 2016, the General Services Administration (GSA) is hosting its very first Technology Industry Day. Sign up to hear about how GSA is transforming technology in the federal government, see demos of products and solutions developed by technologists and, last but not least, provide feedback on how we can work better with industry.","date" : "2016-08-31T13:00:45-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"gsa-blog-team" : "GSA Blog Team"},"topics" : {
        
            "budgeting-and-performance" : "Budgeting and performance",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "innovation" : "Innovation",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-08-31-sign-up-for-the-technology-industry-day.md",
      
      "filepath" :"news/2016/08/2016-08-31-sign-up-for-the-technology-industry-day.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/08/2016-08-31-sign-up-for-the-technology-industry-day.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/08/2016-08-31-sign-up-for-the-technology-industry-day.md","slug" : "sign-up-for-the-technology-industry-day","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/08/31/sign-up-for-the-technology-industry-day/"
    },{"title" :"Trends on Tuesday: Signs of the App-ocalypse","summary" : "A new report from the Mobile Ecosystem Forum shows that most users delete apps because of security concerns. The report also said that 47% of survey respondents would pay extra for an app that didn’t share personal information and that the inability to find a privacy policy is one of the leading reasons for consumers losing trust","date" : "2016-08-16T13:00:03-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"wsullivan" : "Will Sullivan"},"topics" : {
        
            "analytics" : "Analytics",
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-08-16-trends-on-tuesday-signs-of-the-app-ocalypse.md",
      
      "filepath" :"news/2016/08/2016-08-16-trends-on-tuesday-signs-of-the-app-ocalypse.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/08/2016-08-16-trends-on-tuesday-signs-of-the-app-ocalypse.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/08/2016-08-16-trends-on-tuesday-signs-of-the-app-ocalypse.md","slug" : "trends-on-tuesday-signs-of-the-app-ocalypse","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/08/16/trends-on-tuesday-signs-of-the-app-ocalypse/"
    },{"title" :"Managing Federal Information as a Strategic Resource","summary" : "Summary: Today, OMB is releasing an update to Circular A-130, the Federal Government’s governing document for the management of Federal information resources. Today the Office of Management and Budget (OMB) is releasing an update to the Federal Government’s governing document for the management of Federal information resources: Circular A-130, Managing Information as a Strategic Resource.","date" : "2016-07-27T15:00:01-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tony-scott" : "Tony Scott","howard-shelanski" : "Howard Shelanski","anne-rung" : "Anne Rung","marc-groman" : "Marc Groman"},"topics" : {
        
            "acquisition" : "Acquisition",
            "content-strategy" : "Content strategy",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-07-27-managing-federal-information-as-a-strategic-resource.md",
      
      "filepath" :"news/2016/07/2016-07-27-managing-federal-information-as-a-strategic-resource.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/07/2016-07-27-managing-federal-information-as-a-strategic-resource.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/07/2016-07-27-managing-federal-information-as-a-strategic-resource.md","slug" : "managing-federal-information-as-a-strategic-resource","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/07/27/managing-federal-information-as-a-strategic-resource/"
    },{"title" :"Enhancing our Nation\u0026#8217;s Cybersecurity","summary" : "The mission of U.S. General Services Administration (GSA)’s Integrated Technology Services (ITS) is to deliver best value technology solutions to the government and the American people, and one of the most critically important capabilities that our nation currently needs is strengthened cybersecurity. We have been working with numerous other federal agencies to ensure that the","date" : "2016-07-14T14:00:04-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"mary-davie" : "Mary Davie"},"topics" : {
        
            "acquisition" : "Acquisition",
            "content-strategy" : "Content strategy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-07-14-enhancing-our-nations-cybersecurity.md",
      
      "filepath" :"news/2016/07/2016-07-14-enhancing-our-nations-cybersecurity.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/07/2016-07-14-enhancing-our-nations-cybersecurity.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/07/2016-07-14-enhancing-our-nations-cybersecurity.md","slug" : "enhancing-our-nations-cybersecurity","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/07/14/enhancing-our-nations-cybersecurity/"
    },{"title" :"Trends on Tuesday: Adoption for Pokémon Go Mobile App Surges","summary" : "Augmented Reality games have existed for years, but have mostly failed to catch a mainstream audience; Pokémon Go just changed all that this weekend. The game that launched early this month has exploded in popularity and is close to surpassing Twitter in daily active","date" : "2016-07-12T10:00:37-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"wsullivan" : "Will Sullivan"},"topics" : {
        
            "analytics" : "Analytics",
            "content-strategy" : "Content strategy",
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "security" : "Security",
            "social-media" : "Social media"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-07-12-trends-on-tuesday-adoption-for-pokemon-go-mobile-app-surges.md",
      
      "filepath" :"news/2016/07/2016-07-12-trends-on-tuesday-adoption-for-pokemon-go-mobile-app-surges.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/07/2016-07-12-trends-on-tuesday-adoption-for-pokemon-go-mobile-app-surges.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/07/2016-07-12-trends-on-tuesday-adoption-for-pokemon-go-mobile-app-surges.md","slug" : "trends-on-tuesday-adoption-for-pokemon-go-mobile-app-surges","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/07/12/trends-on-tuesday-adoption-for-pokemon-go-mobile-app-surges/"
    },{"title" :"The Data Briefing: I, For One, Welcome Our New Chatbot Blockchain Digital Autonomous Organizations","summary" : "It is at the intersections of fields where you find the most fascinating and innovative concepts. Recently, a conference on “Open Human Resources and the Cognitive Era” explored the use of chatbots and blockchain technologies in human resources. Human Resources (HR) is quietly undergoing a revolution as many HR practitioners are transforming HR by using","date" : "2016-07-06T11:00:56-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"bbrantley" : "Bill Brantley"},"topics" : {
        
            "application-programming-interface" : "Application programming interface",
            "artificial-intelligence" : "Artificial intelligence",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "emerging-tech" : "Emerging tech",
            "open-data" : "Open data",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "software-engineering" : "Software engineering",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-07-06-the-data-briefing-i-for-one-welcome-our-new-chatbot-blockchain-digital-autonomous-organizations.md",
      
      "filepath" :"news/2016/07/2016-07-06-the-data-briefing-i-for-one-welcome-our-new-chatbot-blockchain-digital-autonomous-organizations.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/07/2016-07-06-the-data-briefing-i-for-one-welcome-our-new-chatbot-blockchain-digital-autonomous-organizations.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/07/2016-07-06-the-data-briefing-i-for-one-welcome-our-new-chatbot-blockchain-digital-autonomous-organizations.md","slug" : "the-data-briefing-i-for-one-welcome-our-new-chatbot-blockchain-digital-autonomous-organizations","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/07/06/the-data-briefing-i-for-one-welcome-our-new-chatbot-blockchain-digital-autonomous-organizations/"
    },{"title" :"Trends on Tuesday: Key Trends for Government from Mary Meeker’s 2016 Internet Trends","summary" : "Internet strategist Mary Meeker delivered her 2016 Internet Trends report this month, and there are several key takeaways for government agencies to consider and continue tracking as our connected world continues to evolve: Mobile phone adoption and Internet growth is meeting saturation. Incremental global growth will continue (especially in India, which she called out for","date" : "2016-06-21T12:00:54-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"wsullivan" : "Will Sullivan"},"topics" : {
        
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-06-21-trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends.md",
      
      "filepath" :"news/2016/06/2016-06-21-trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/06/2016-06-21-trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/06/2016-06-21-trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends.md","slug" : "trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/06/21/trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends/"
    },{"title" :"Why Switching to HTTPS Will Make Your Analytics Better","summary" : "Federal agencies are required to make all federal websites accessible through a secure, HTTPS-only connection by the end of the 2016 calendar year. What you might not have known is that the switch to HTTPS will improve your ability to track which sites are directing web traffic to yours. Recently, a federal colleague reached out","date" : "2016-06-06T11:00:14-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tlowden" : "Tim Lowden"},"topics" : {
        
            "analytics" : "Analytics",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-06-06-why-switching-to-https-will-make-your-analytics-better.md",
      
      "filepath" :"news/2016/06/2016-06-06-why-switching-to-https-will-make-your-analytics-better.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/06/2016-06-06-why-switching-to-https-will-make-your-analytics-better.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/06/2016-06-06-why-switching-to-https-will-make-your-analytics-better.md","slug" : "why-switching-to-https-will-make-your-analytics-better","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/06/06/why-switching-to-https-will-make-your-analytics-better/"
    },{"title" :"Open Police Data Re-identification Risks","summary" : "Last week I spoke at a White House event, “Opportunities &amp; Challenges: Open Police Data and Ensuring the Safety and Security of Victims of Intimate Partner Violence and Sexual Assault.” This event brought together representatives from government agencies, police departments, and advocacy groups to discuss the potential safety and privacy impact of open police data","date" : "2016-05-17T10:00:43-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"lorrie-cranor" : "Lorrie Cranor"},"topics" : {
        
            "open-data" : "Open data",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-05-17-open-police-data-re-identification-risks.md",
      
      "filepath" :"news/2016/05/2016-05-17-open-police-data-re-identification-risks.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/05/2016-05-17-open-police-data-re-identification-risks.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/05/2016-05-17-open-police-data-re-identification-risks.md","slug" : "open-police-data-re-identification-risks","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/05/17/open-police-data-re-identification-risks/"
    },{"title" :"Making Your Agency Apps Secure","summary" : "Security and privacy are part of the six Mobile User Experience Guidelines developed by the MobileGov Community of Practice.","date" : "2016-01-21T13:21:09-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"awichman" : "Ashley Wichman"},"topics" : {
        
            "mobile" : "Mobile",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-01-21-making-your-agency-apps-secure.md",
      
      "filepath" :"news/2016/01/2016-01-21-making-your-agency-apps-secure.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/01/2016-01-21-making-your-agency-apps-secure.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/01/2016-01-21-making-your-agency-apps-secure.md","slug" : "making-your-agency-apps-secure","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/01/21/making-your-agency-apps-secure/"
    },{"title" :"Trends on Tuesday: 10 Mobile, Government and Tech Trends for 2016","summary" : "As we move into 2016, here are 10 trends I foresee flourishing around mobile, technology and government: The mobile-majority tipping point in government. Many agencies are already past this point, but as a whole, government websites are still desktop-majority, with 66% of people accessing federal websites via desktop and 34% on mobile. In 2016, the double-digit mobile","date" : "2016-01-12T11:00:37-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"wsullivan" : "Will Sullivan"},"topics" : {
        
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-01-12-trends-on-tuesday-10-mobile-government-and-tech-trends-for-2016.md",
      
      "filepath" :"news/2016/01/2016-01-12-trends-on-tuesday-10-mobile-government-and-tech-trends-for-2016.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/01/2016-01-12-trends-on-tuesday-10-mobile-government-and-tech-trends-for-2016.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/01/2016-01-12-trends-on-tuesday-10-mobile-government-and-tech-trends-for-2016.md","slug" : "trends-on-tuesday-10-mobile-government-and-tech-trends-for-2016","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/01/12/trends-on-tuesday-10-mobile-government-and-tech-trends-for-2016/"
    },{"title" :"DigitalGov's 2015 Year in Review","summary" : "As we look ahead to 2016, we wanted to take a minute to look at our most popular content in 2015 and reflect on our second year. This was a big year for DigitalGov as we saw our session traffic nearly double and our weekly and daily email subscribers increase by 15%.","date" : "2015-12-31T11:00:26-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"andreanocesigritz" : "Andrea Sigritz"},"topics" : {
        
            "accessibility" : "Accessibility",
            "security" : "Security",
            "social-media" : "Social media",
            "terms-of-service" : "Terms of service",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-12-31-digitalgovs-2015-year-in-review.md",
      
      "filepath" :"news/2015/12/2015-12-31-digitalgovs-2015-year-in-review.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/12/2015-12-31-digitalgovs-2015-year-in-review.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/12/2015-12-31-digitalgovs-2015-year-in-review.md","slug" : "digitalgovs-2015-year-in-review","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/12/31/digitalgovs-2015-year-in-review/"
    },{"title" :"OCSIT’s 2015 Customer Survey—What We Learned","summary" : "Three years ago, GSA’s Office of Citizen Services and Innovative Technologies (OCSIT) set out to design a system to consistently measure customer satisfaction across our office. We were inspired by the Digital Government Strategy, which tasks agencies to adopt a customer-centric approach to service delivery.","date" : "2015-12-28T10:00:13-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"rflagg" : "Rachel Flagg"},"topics" : {
        
            "analytics" : "Analytics",
            "budgeting-and-performance" : "Budgeting and performance",
            "customer-experience" : "Customer experience",
            "information-collection" : "Information collection",
            "security" : "Security",
            "terms-of-service" : "Terms of service"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-12-28-ocsits-2015-customer-survey-what-we-learned.md",
      
      "filepath" :"news/2015/12/2015-12-28-ocsits-2015-customer-survey-what-we-learned.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/12/2015-12-28-ocsits-2015-customer-survey-what-we-learned.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/12/2015-12-28-ocsits-2015-customer-survey-what-we-learned.md","slug" : "ocsits-2015-customer-survey-what-we-learned","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/12/28/ocsits-2015-customer-survey-what-we-learned/"
    },{"title" :"The Content Corner: The Balance Between SEO and the User","summary" : "I always think of SEO like the dentist—no one really likes it, but you need to do it. Yet, despite my lack of excitement for the topic, this will be at a minimum my second post (here’s the first) about the relationship between creating good content and SEO practices. Today I want to dive a little","date" : "2015-11-30T10:00:16-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tyrus-manuel" : "Tyrus Manuel"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-11-30-the-content-corner-the-balance-between-seo-and-the-user.md",
      
      "filepath" :"news/2015/11/2015-11-30-the-content-corner-the-balance-between-seo-and-the-user.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/11/2015-11-30-the-content-corner-the-balance-between-seo-and-the-user.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/11/2015-11-30-the-content-corner-the-balance-between-seo-and-the-user.md","slug" : "the-content-corner-the-balance-between-seo-and-the-user","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/11/30/the-content-corner-the-balance-between-seo-and-the-user/"
    },{"title" :"Federal Information Security Management Act of 2002 \u0026#8211; Presentation to the 2003 FISSEA Conference","summary" : "The head of the agency delegates to the CIO a number of information security responsibilities. The CIO in turn designates a senior agency information security officer.","date" : "2015-11-23T04:31:09-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"andreanocesigritz" : "Andrea Sigritz"},"topics" : {
        
            "public-policy" : "Public policy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"federal-information-security-management-act-of-2002-presentation-to-the-2003-fissea-conference.md",
      
      "filepath" :"resources/federal-information-security-management-act-of-2002-presentation-to-the-2003-fissea-conference.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/federal-information-security-management-act-of-2002-presentation-to-the-2003-fissea-conference.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/federal-information-security-management-act-of-2002-presentation-to-the-2003-fissea-conference.md","slug" : "federal-information-security-management-act-of-2002-presentation-to-the-2003-fissea-conference","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/federal-information-security-management-act-of-2002-presentation-to-the-2003-fissea-conference/"
    },{"title" :"HTTPS and Other Ranking Factors: What Impacts the SEO of Government Websites?","summary" : "Following the recent OMB memo that all publicly available federal websites and Web services must implement HTTPS by December 31, 2016, Web content managers across government are considering the SEO (search engine optimization) implications of the transition, among other details.","date" : "2015-09-02T10:00:43-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"dmccleskey" : "Dawn Pointer McCleskey"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "plain-language" : "Plain language",
            "search" : "Search",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-09-02-https-and-other-ranking-factors-what-impacts-the-seo-of-government-websites.md",
      
      "filepath" :"news/2015/09/2015-09-02-https-and-other-ranking-factors-what-impacts-the-seo-of-government-websites.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/09/2015-09-02-https-and-other-ranking-factors-what-impacts-the-seo-of-government-websites.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/09/2015-09-02-https-and-other-ranking-factors-what-impacts-the-seo-of-government-websites.md","slug" : "https-and-other-ranking-factors-what-impacts-the-seo-of-government-websites","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/09/02/https-and-other-ranking-factors-what-impacts-the-seo-of-government-websites/"
    },{"title" :"DigitalGov Summit Recap: Building Privacy \u0026 Identity Management in the Open","summary" : "How can government protect citizens while delivering the services they demand in the modern age? This was a theme of the panel discussion on privacy and identity management at the 2015 DigitalGov Citizen Services Summit.","date" : "2015-08-28T10:00:32-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"andreanocesigritz" : "Andrea Sigritz"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-08-28-digitalgov-summit-recap-building-privacy-identity-management-in-the-open.md",
      
      "filepath" :"news/2015/08/2015-08-28-digitalgov-summit-recap-building-privacy-identity-management-in-the-open.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/08/2015-08-28-digitalgov-summit-recap-building-privacy-identity-management-in-the-open.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/08/2015-08-28-digitalgov-summit-recap-building-privacy-identity-management-in-the-open.md","slug" : "digitalgov-summit-recap-building-privacy-identity-management-in-the-open","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/08/28/digitalgov-summit-recap-building-privacy-identity-management-in-the-open/"
    },{"title" :"Secure Central Hosting for the Digital Analytics Program","summary" : "The U.S. government’s Digital Analytics Program (DAP) collects Web traffic and analytics data from across the federal government.","date" : "2015-08-14T13:00:48-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"eric-mill" : "Eric Mill"},"topics" : {
        
            "analytics" : "Analytics",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-08-14-secure-central-hosting-for-the-digital-analytics-program.md",
      
      "filepath" :"news/2015/08/2015-08-14-secure-central-hosting-for-the-digital-analytics-program.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/08/2015-08-14-secure-central-hosting-for-the-digital-analytics-program.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/08/2015-08-14-secure-central-hosting-for-the-digital-analytics-program.md","slug" : "secure-central-hosting-for-the-digital-analytics-program","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/08/14/secure-central-hosting-for-the-digital-analytics-program/"
    },{"title" :"Help Us Add Resources to the Updated Mobile User Experience Guidelines!","summary" : "Government agencies need to make sure their mobile websites and native apps don’t become one of the estimated billions of applications that end up in the app graveyard. The need for digital products to work better is not new in the federal government. Resources like the Digital Playbook and Public Participation Playbook have had impact","date" : "2015-07-31T13:10:20-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jparcell" : "Jacob Parcell"},"topics" : {
        
            "mobile" : "Mobile",
            "security" : "Security",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-07-31-help-us-add-resources-to-the-updated-mobile-user-experience-guidelines.md",
      
      "filepath" :"news/2015/07/2015-07-31-help-us-add-resources-to-the-updated-mobile-user-experience-guidelines.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/07/2015-07-31-help-us-add-resources-to-the-updated-mobile-user-experience-guidelines.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/07/2015-07-31-help-us-add-resources-to-the-updated-mobile-user-experience-guidelines.md","slug" : "help-us-add-resources-to-the-updated-mobile-user-experience-guidelines","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/07/31/help-us-add-resources-to-the-updated-mobile-user-experience-guidelines/"
    },{"title" :"HTTPS For All","summary" : "With the release of a new dashboard to measure best Web practices in the federal government and the establishment of a government-wide HTTPS Only Standard, the time to make the switch to HTTPS has arrived. Agencies have until December 31, 2016, to make the switch. The move to HTTPS is not only happening in government;","date" : "2015-06-15T10:00:32-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kdaniel" : "Kendrick Daniel"},"topics" : {
        
            "open-data" : "Open data",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-06-15-https-for-all.md",
      
      "filepath" :"news/2015/06/2015-06-15-https-for-all.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/06/2015-06-15-https-for-all.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/06/2015-06-15-https-for-all.md","slug" : "https-for-all","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/06/15/https-for-all/"
    },{"title" :"Taking the Pulse of the Federal Government's Web Presence","summary" : "The U.S. federal government is launching a new project to monitor how it&rsquo;s doing at best practices on the Web.","date" : "2015-06-03T13:10:57-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"eric-mill" : "Eric Mill","julia-solorzano" : "Julia Solórzano","gray-brooks" : "Gray Brooks","john-tindel" : "John Tindel"},"topics" : {
        
            "analytics" : "Analytics",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-06-03-taking-the-pulse-of-the-federal-governments-web-presence.md",
      
      "filepath" :"news/2015/06/2015-06-03-taking-the-pulse-of-the-federal-governments-web-presence.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/06/2015-06-03-taking-the-pulse-of-the-federal-governments-web-presence.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/06/2015-06-03-taking-the-pulse-of-the-federal-governments-web-presence.md","slug" : "taking-the-pulse-of-the-federal-governments-web-presence","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/06/03/taking-the-pulse-of-the-federal-governments-web-presence/"
    },{"title" :"Sharing Social Media Strategies: The National Strategy for Trusted Identities in Cyberspace Program Office","summary" : "Creating a tweet, posting a photo, or updating a status may take mere seconds. However, a well-thought-out social media strategy is needed for long-term success. In fact, the recently released U.S. Public Participation Playbook mentions strategy in its very first play: clearly define and communicate your objectives. Knowing what you hope to accomplish and how","date" : "2015-04-03T10:00:10-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"awichman" : "Ashley Wichman"},"topics" : {
        
            "security" : "Security",
            "social-media" : "Social media"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-04-03-sharing-social-media-strategies-the-national-strategy-for-trusted-identities-in-cyberspace-program-office.md",
      
      "filepath" :"news/2015/04/2015-04-03-sharing-social-media-strategies-the-national-strategy-for-trusted-identities-in-cyberspace-program-office.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/04/2015-04-03-sharing-social-media-strategies-the-national-strategy-for-trusted-identities-in-cyberspace-program-office.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/04/2015-04-03-sharing-social-media-strategies-the-national-strategy-for-trusted-identities-in-cyberspace-program-office.md","slug" : "sharing-social-media-strategies-the-national-strategy-for-trusted-identities-in-cyberspace-program-office","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/04/03/sharing-social-media-strategies-the-national-strategy-for-trusted-identities-in-cyberspace-program-office/"
    },{"title" :"HTTP vs HTTPS: Is it Time For a Change?","summary" : "Data. Security. Privacy. These are the cornerstones of many discussions concerning technology. The security of citizen information when interacting with the federal government will be increasingly important as we progress into the future. A few agencies have begun to use Hyper Text Transfer Protocol Secure (HTTPS) in lieu of the standard HTTP. For these agencies,","date" : "2015-03-25T10:00:43-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kdaniel" : "Kendrick Daniel"},"topics" : {
        
            "analytics" : "Analytics",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-03-25-http-vs-https-is-it-time-for-a-change.md",
      
      "filepath" :"news/2015/03/2015-03-25-http-vs-https-is-it-time-for-a-change.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/03/2015-03-25-http-vs-https-is-it-time-for-a-change.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/03/2015-03-25-http-vs-https-is-it-time-for-a-change.md","slug" : "http-vs-https-is-it-time-for-a-change","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/03/25/http-vs-https-is-it-time-for-a-change/"
    },{"title" :"DigitalGov Monthly Theme: How Data and Code Improve Government Services","summary" : "Data and code are the foundation, building blocks, and cornerstone of government digital services. They are the keys that open the door to a better digital government future and are fundamental in making government more open.","date" : "2015-03-10T11:43:05-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"awichman" : "Ashley Wichman","jparcell" : "Jacob Parcell"},"topics" : {
        
            "application-programming-interface" : "Application programming interface",
            "open-data" : "Open data",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-03-10-digitalgov-monthly-theme-how-data-and-code-improve-government-services.md",
      
      "filepath" :"news/2015/03/2015-03-10-digitalgov-monthly-theme-how-data-and-code-improve-government-services.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/03/2015-03-10-digitalgov-monthly-theme-how-data-and-code-improve-government-services.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/03/2015-03-10-digitalgov-monthly-theme-how-data-and-code-improve-government-services.md","slug" : "digitalgov-monthly-theme-how-data-and-code-improve-government-services","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/03/10/digitalgov-monthly-theme-how-data-and-code-improve-government-services/"
    },{"title" :"Enabling Trusted Digital Interactions Between People \u0026 Government","summary" : "Connect.Gov is a service that helps reduce agency investment and enables a secure, trusted, and inter-operable method for digital interactions between people and government.","date" : "2015-03-06T10:00:01-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jennifer-kerber" : "Jennifer Kerber","jonathan-prisby" : "Jonathan Prisby"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "trust" : "Trust"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-03-06-enabling-trusted-digital-interactions-between-people-government.md",
      
      "filepath" :"news/2015/03/2015-03-06-enabling-trusted-digital-interactions-between-people-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/03/2015-03-06-enabling-trusted-digital-interactions-between-people-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/03/2015-03-06-enabling-trusted-digital-interactions-between-people-government.md","slug" : "enabling-trusted-digital-interactions-between-people-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/03/06/enabling-trusted-digital-interactions-between-people-government/"
    },{"title" :"The API Briefing: Practicing Safe App Development with Secure Federal APIs","summary" : "When browsing the various APIs offered by the federal government, you may have noticed that developers need to sign up for an API key. You may have also noticed that the documentation tells app developers to access the API using specified methods. Along with these two requirements, federal API creators","date" : "2015-03-04T12:10:13-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"bbrantley" : "Bill Brantley"},"topics" : {
        
            "application-programming-interface" : "Application programming interface",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-03-04-the-api-briefing-practicing-safe-app-development-with-secure-federal-apis.md",
      
      "filepath" :"news/2015/03/2015-03-04-the-api-briefing-practicing-safe-app-development-with-secure-federal-apis.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/03/2015-03-04-the-api-briefing-practicing-safe-app-development-with-secure-federal-apis.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/03/2015-03-04-the-api-briefing-practicing-safe-app-development-with-secure-federal-apis.md","slug" : "the-api-briefing-practicing-safe-app-development-with-secure-federal-apis","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/03/04/the-api-briefing-practicing-safe-app-development-with-secure-federal-apis/"
    },{"title" :"The Internet of Everything \u0026 Small Business Opportunities","summary" : "In 1995, the World Wide Web, which had been fairly niche up until then, attracted mainstream attention. What followed were 20 years of business and social innovations in how we humans chose to use the web at work, school, at home, and with our friends. The web and its “Web 2.0” successor allowed us to","date" : "2015-02-26T10:00:53-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"david-a-bray" : "David A. Bray","g-nagesh-rao" : "G. Nagesh Rao"},"topics" : {
        
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-02-26-the-internet-of-everything-small-business-opportunities.md",
      
      "filepath" :"news/2015/02/2015-02-26-the-internet-of-everything-small-business-opportunities.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/02/2015-02-26-the-internet-of-everything-small-business-opportunities.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/02/2015-02-26-the-internet-of-everything-small-business-opportunities.md","slug" : "the-internet-of-everything-small-business-opportunities","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/02/26/the-internet-of-everything-small-business-opportunities/"
    },{"title" :"Social Media Cyber-Vandalism Toolkit","deck" : "Guidance on how to respond to cyber-hijacking.","summary" : "Cyber-vandalism presents a serious challenge to online-based communication tools. This document provides guidance and security practices to federal, state, and local government employees. Suggestions and resources prepare users to respond to cyber-hijacking.","date" : "2015-01-27T01:09:20-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jherman" : "Justin Herman"},"topics" : {
        
            "security" : "Security",
            "social-media" : "Social media"
            },"branch" : "bc-archive-content-3",
      "filename" :"readiness-recovery-response-social-media-cyber-vandalism-toolkit.md",
      
      "filepath" :"resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit.md","slug" : "readiness-recovery-response-social-media-cyber-vandalism-toolkit","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit/"
    },{"title" :"Trends on Tuesday: Half of Online Americans Don’t Know What a Privacy Policy Is","summary" : "Federal agencies are required by law to use privacy policies on their digital properties that explain how they use the data they collect about users and visitors. This ensures that these users and visitors know what the government is doing with their data.","date" : "2014-12-23T09:00:17-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jparcell" : "Jacob Parcell"},"topics" : {
        
            "emerging-tech" : "Emerging tech",
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2014-12-23-trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is.md",
      
      "filepath" :"news/2014/12/2014-12-23-trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2014/12/2014-12-23-trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2014/12/2014-12-23-trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is.md","slug" : "trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2014/12/23/trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is/"
    },{"title" :"Beware the Cyber Security House of Horrors!","summary" : "Ghosts. Ghouls. Zombies. Multi-stakeholder content audits. This Halloween there is no shortage of terrors lurking to keep federal Web managers up all night, and our work is largely done in one of the scariest domains of all: cyberspace. Every moment of every day, a vast system of computers and networks are actively working to support","date" : "2014-10-30T04:29:46-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jordan-higgins" : "Jordan Higgins"},"topics" : {
        
            "emerging-tech" : "Emerging tech",
            "security" : "Security",
            "social-media" : "Social media"
            },"branch" : "bc-archive-content-3",
      "filename" :"2014-10-30-cyber-house-of-horrors.md",
      
      "filepath" :"news/2014/10/2014-10-30-cyber-house-of-horrors.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2014/10/2014-10-30-cyber-house-of-horrors.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2014/10/2014-10-30-cyber-house-of-horrors.md","slug" : "cyber-house-of-horrors","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2014/10/30/cyber-house-of-horrors/"
    },{"title" :"State CIO Top Ten Policy and Technology Priorities for 2014","summary" : "Security, consolidation, cloud services and enterprise portfolio management top the list of critical state CIO priorities in 2014, according to state information technology leaders surveyed by the National Association of State Chief Information Officers (NASCIO). The prioritized rankings of strategies and technologies reflect voting by state CIOs and are","date" : "2013-11-22T11:36:14-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"lnelson" : "Lisa Nelson"},"topics" : {
        
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-11-22-state-cio-top-ten-policy-and-technology-priorities-for-2014.md",
      
      "filepath" :"news/2013/11/2013-11-22-state-cio-top-ten-policy-and-technology-priorities-for-2014.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/11/2013-11-22-state-cio-top-ten-policy-and-technology-priorities-for-2014.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/11/2013-11-22-state-cio-top-ten-policy-and-technology-priorities-for-2014.md","slug" : "state-cio-top-ten-policy-and-technology-priorities-for-2014","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/11/22/state-cio-top-ten-policy-and-technology-priorities-for-2014/"
    },{"title" :"Cloud Computing in the Federal Government","summary" : "Cloud Computing enables convenient, on-demand access to, and rapid deployment of, shared computing resources such as networks, servers, storage, applications, and services. Plan What is the Cloud? Is Cloud Computing for you? What types of services does Cloud Computing support? Types of Cloud environments Implement Learn steps to acquire, manage, and secure your agency","date" : "2013-10-17T13:27:51-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"matt-goodrich" : "Matt Goodrich"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-10-17-cloud-computing-in-the-federal-government.md",
      
      "filepath" :"news/2013/10/2013-10-17-cloud-computing-in-the-federal-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/10/2013-10-17-cloud-computing-in-the-federal-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/10/2013-10-17-cloud-computing-in-the-federal-government.md","slug" : "cloud-computing-in-the-federal-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/10/17/cloud-computing-in-the-federal-government/"
    },{"title" :"Mobile Product Security and Privacy Testing Resources","summary" : "Security testing is used to ensure that a mobile product does not pose a threat to agency IT systems and databases. In addition, privacy testing ensures that an app does not put the user’s personally identifiable information into a compromisable position. This article was developed as part of the Mobile Application Development Program. See our","date" : "2013-08-05T15:01:32-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jparcell" : "Jacob Parcell"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "mobile" : "Mobile",
            "privacy" : "Privacy",
            "research" : "Research",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-08-05-mobile-product-security-and-privacy-testing-resources.md",
      
      "filepath" :"news/2013/08/2013-08-05-mobile-product-security-and-privacy-testing-resources.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/08/2013-08-05-mobile-product-security-and-privacy-testing-resources.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/08/2013-08-05-mobile-product-security-and-privacy-testing-resources.md","slug" : "mobile-product-security-and-privacy-testing-resources","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/08/05/mobile-product-security-and-privacy-testing-resources/"
    },{"title" :"API Security","summary" : "Like website development, API security revolves around three stages—planning the API, testing the API, and monitoring the API after it has launched. The planning stage requires those involved to conceptually map several design decisions and the impact that they will have on security. The second stage applies your agency’s security program to the API release","date" : "2013-07-29T01:12:58-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"gray-brooks" : "Gray Brooks"},"topics" : {
        
            "application-programming-interface" : "Application programming interface",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-07-29-api-security.md",
      
      "filepath" :"news/2013/07/2013-07-29-api-security.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/07/2013-07-29-api-security.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/07/2013-07-29-api-security.md","slug" : "api-security","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/07/29/api-security/"
    },{"title" :"Twitter\u0026#8217;s Two Step Verification Process","summary" : "To enhance security, Twitter now offers two-step verification. The release of the new feature follows several high-profile account breaches – including a false tweet sent from the Associated Press’s Twitter account in April. If you chose to enable the two-step verification feature, Twitter sends a text message with a unique code to a cell phone that must be","date" : "2013-05-31T11:16:45-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jason-kelly" : "Jason Kelly"},"topics" : {
        
            "security" : "Security",
            "social-media" : "Social media"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-05-31-twitters-two-step-verification-process.md",
      
      "filepath" :"news/2013/05/2013-05-31-twitters-two-step-verification-process.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/05/2013-05-31-twitters-two-step-verification-process.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/05/2013-05-31-twitters-two-step-verification-process.md","slug" : "twitters-two-step-verification-process","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/05/31/twitters-two-step-verification-process/"
    },{"title" :"Government Must Respond Rapidly to Social Media Hacking","summary" : "The hacking of an Associated Press news account on Twitter this week, and its fallout, underscored the need for agencies","date" : "2013-04-25T13:25:31-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jherman" : "Justin Herman"},"topics" : {
        
            "security" : "Security",
            "social-media" : "Social media"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-04-25-government-must-respond-rapidly-to-social-media-hacking.md",
      
      "filepath" :"news/2013/04/2013-04-25-government-must-respond-rapidly-to-social-media-hacking.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/04/2013-04-25-government-must-respond-rapidly-to-social-media-hacking.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/04/2013-04-25-government-must-respond-rapidly-to-social-media-hacking.md","slug" : "government-must-respond-rapidly-to-social-media-hacking","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/04/25/government-must-respond-rapidly-to-social-media-hacking/"
    },{"title" :"","summary" : "CISA works with partners to defend against today’s threats and collaborate to build a more secure and resilient infrastructure for the future.","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"source_cisa.md",
      
      "filepath" :"sources/source_cisa.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/sources/source_cisa.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/sources/source_cisa.md","slug" : "cisa","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/sources/cisa/"
    },{"title" :"","summary" : "The mission of the Department of Homeland Security is to secure the nation from the many threats we face.","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"source_dhs.md",
      
      "filepath" :"sources/source_dhs.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/sources/source_dhs.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/sources/source_dhs.md","slug" : "dhs","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/sources/dhs/"
    },{"title" :"","summary" : "The Federal Risk and Authorization Management Program (FedRAMP) promotes the adoption of secure cloud services across the federal government by providing a standardized approach to security and risk assessment for cloud technologies and federal agencies.","date" : "0001-01-01T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"source_fedramp.md",
      
      "filepath" :"sources/source_fedramp.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/sources/source_fedramp.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/sources/source_fedramp.md","slug" : "fedramp","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/sources/fedramp/"
    }]
}
