About 104,000 results
Open links in new tab
  1. Department of State Vulnerability Disclosure Policy

    This policy describes what systems and types of research are covered under this policy, how to send us vulnerability reports, and how long we ask security researchers to wait before publicly …

  2. Cybersecurity - United States Department of State

    Maintaining a 24x7x365 watch on the Department’s global cyber infrastructure and managing many aspects of cyber defense including incident response, in-depth analysis of cyber …

  3. At-Risk Populations - United States Department of State

    All forcibly displaced and stateless populations are considered vulnerable and typically face protection concerns en route to, and when they arrive in, host communities, whether in cities, …

  4. U.S. Actions to Tackle Sea-Level Rise at Home and Abroad

    Sep 25, 2024 · Assessing vulnerability to climate impacts in Toamasina, Madagascar: Rapid sea-level rise and coastal flooding threaten Toamasina, Madagascar’s second-largest city and …

  5. Department Vulnerability Disclosure Intake Form - United States ...

    This form is for submitting vulnerability reports in accordance with the Department of State Vulnerability Disclosure Policy (VDP) at https://2021-2025.state.gov/vulnerability-disclosure …

  6. Those inhabiting coastal regions and low–income urban communities are more likely to be afected by the damage of severe weather and, consequently, be more vulnerable to exploitation, while …

  7. Understanding the Dangers of Social Engineering

    Social engineering is the art of manipulating individuals to divulge confidential information or perform actions that compromise security. Attackers employ social engineering to elicit human …

  8. Risk Analysis - United States Department of State

    Risks are unavoidable – all projects inherently contain both internal and external risks. However, with proper identification and management, risks can be prepared for, minimized, or mitigated. …

  9. U.S. Atrocity Risk Assessment Framework

    Dec 21, 2022 · All elements of atrocity assessment should include a gender-focused analysis to examine the role expectations, rights, and behavior of members of certain groups and how …

  10. Understanding and Preventing Phishing Attacks - United States ...

    May 21, 2025 · Phishing is currently the most common and most successful type of cyber-attack. This initial guide should help you better identify and defend against those attacks. In it, we …