Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

ones and zeros on top of a background with a lock graphic

Cybersecurity

Overview

NIST develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of U.S. industry, federal agencies and the broader public. Our activities range from producing specific information that organizations can put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.

Some NIST cybersecurity assignments are defined by federal statutes, executive orders and policies. For example, the Office of Management and Budget (OMB) mandates that all federal agencies implement NIST’s cybersecurity standards and guidance for non-national security systems. Our cybersecurity activities also are driven by the needs of U.S. industry and the broader public. We engage vigorously with stakeholders to set priorities and ensure that our resources address the key issues that face. 

NIST also advances understanding and improves the management of privacy risks, some of which relate directly to cybersecurity.

Priority areas to which NIST contributes – and plans to focus more on - include cryptography, education and workforce, emerging technologies, risk management, identity and access management, measurements, privacy, trustworthy networks and trustworthy platforms.

Additional details can be found below, in the featured content of this page, and in these brief and more detailed fact sheets.

The Research

Projects & Programs

Trustworthy Networks of Things

Ongoing
NIST is working with industry to design, standardize, test and foster adoption of network-centric approaches to protect IoT devices from the Internet and to

News

a kitchen with a voice activated assistant on the counter, graphics indicate that it is connected wirelessly to the stove, the toaster, the blender and so on.

Cybersecurity Labeling for Consumer IoT Devices: A Q&A with NIST’s Katerina Megas

The connection of devices, including household devices, to the internet has created a raft of new potential entryways for hackers to invade your home networks and cause chaos and destruction. The proliferation of these devices has prompted calls for the creation of consumer labels to let would-be buyers know about their cybersecurity capabilities. Taking Measure interviewed National Institute of
A user creates their own federation from different clouds and organizations

IEEE Approves Cloud Computing Standard, Aided by NIST

A woman poses for a head shot outdoors.

Spotlight: Solving a Pressing Puzzle With Cryptography Pro Angela Robinson

Line drawing: a woman in a store aisle examines a label while a thought bubble shows a padlock.

NIST Seeks Public Input on Consumer Software Labeling for Cybersecurity

Protecting Your Small Business: Phishing
Protecting Your Small Business: Phishing
In this animated story, a business manager receives an urgent email from what she believes to be her bank. Before she clicks an included web link, a business colleague alerts her to possible harm from a phishing attack. Learn about common types of phishing messages and why any business owner or employee needs to be vigilant against their danger. This video also helps the viewer learn how to stay prepared, get helpful information, and find support from NIST’s Small Business Cybersecurity Corner website. For the NIST Small Business Cybersecurity Corner: https://www.nist.gov/itl/smallbusinesscyber
Protecting Your Small Business: Ransomware
Protecting Your Small Business: Ransomware
In this animated story, two professionals discuss ransomware attacks and the impacts it can have on small businesses. Since ransomware is a common threat for small businesses, this video provides an example of how ransomware attacks can happen—along with how to stay prepared, get helpful information, and find support from NIST’s Small Business Cybersecurity Corner website. For the NIST Small Business Cybersecurity Corner: https://www.nist.gov/itl/smallbusinesscyber To see more NIST ransomware resources: https://csrc.nist.gov/projects/ransomware-protection-and-response

Cybersecurity Insights Blog

Events

FISSEA Winter Forum: February 15, 2022

Tue, Feb 15 2022, 1:00 - 4:00pm EST
The FISSEA Forums are quarterly meetings to provide opportunities for policy and programmatic updates, the exchange of

Stay in Touch

Sign up for our newsletter to stay up to date with the latest research, trends, and news for Cybersecurity.