Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

blue background with lighter blue icons like computers. Darker blue bar with white words reading: Celebrating 50 years of cybersecurity at NIST



NIST develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of U.S. industry, federal agencies and the broader public. Our activities range from producing specific information that organizations can put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.

Some NIST cybersecurity assignments are defined by federal statutes, executive orders and policies. For example, the Office of Management and Budget (OMB) mandates that all federal agencies implement NIST’s cybersecurity standards and guidance for non-national security systems. Our cybersecurity activities also are driven by the needs of U.S. industry and the broader public. We engage vigorously with stakeholders to set priorities and ensure that our resources address the key issues that face. 

NIST also advances understanding and improves the management of privacy risks, some of which relate directly to cybersecurity.

Priority areas to which NIST contributes – and plans to focus more on - include cryptography, education and workforce, emerging technologies, risk management, identity and access management, measurements, privacy, trustworthy networks and trustworthy platforms.

Additional details can be found below, in the featured content of this page, and in these brief and more detailed fact sheets.

The Research

Projects & Programs

Trustworthy Networks of Things

NIST is working with industry to design, standardize, test and foster adoption of network-centric approaches to protect IoT devices from the Internet and to


Still from Cybersecurity Framework animation

NIST Seeks Input to Update Cybersecurity Framework, Supply Chain Guidance

To keep pace with the always evolving cybersecurity landscape, the National Institute of Standards and Technology (NIST) is planning to revise the widely adopted NIST Cybersecurity Framework (CSF). In advance of the update, NIST is asking the public for information that would improve the effectiveness of the CSF and its alignment with other cybersecurity resources. The agency is also requesting
A shadowy figure stands among conveyor belts, which carry a number of brown packages.

NIST Updates Cybersecurity Guidance for Supply Chain Risk Management

operational technologies control systems and security

NIST Seeks Inputs on its Draft Guide to Operational Technology Security

From a circle reading 5G, lines extend outward to smaller images representing some of 5G's applications, which include telemedicine and autonomous vehicles.

NIST Requests Public Comment on Draft Guidance for 5G Cybersecurity

Protecting Your Small Business: Phishing
Protecting Your Small Business: Phishing
In this animated story, a business manager receives an urgent email from what she believes to be her bank. Before she clicks an included web link, a business colleague alerts her to possible harm from a phishing attack. Learn about common types of phishing messages and why any business owner or employee needs to be vigilant against their danger. This video also helps the viewer learn how to stay prepared, get helpful information, and find support from NIST’s Small Business Cybersecurity Corner website. For the NIST Small Business Cybersecurity Corner:
Protecting Your Small Business: Ransomware
Protecting Your Small Business: Ransomware
In this animated story, two professionals discuss ransomware attacks and the impacts it can have on small businesses. Since ransomware is a common threat for small businesses, this video provides an example of how ransomware attacks can happen—along with how to stay prepared, get helpful information, and find support from NIST’s Small Business Cybersecurity Corner website. For the NIST Small Business Cybersecurity Corner: To see more NIST ransomware resources:

Cybersecurity Insights Blog


Iris Experts Group (IEG) Meeting 2022

Thu, Jun 23 2022, 8:00am - 3:00pm EDT
The Iris Experts Group (IEG) will hold their annual meeting on Thursday June 23, 2022. The meeting will be virtual using

Stay in Touch

Sign up for our newsletter to stay up to date with the latest research, trends, and news for Cybersecurity.