Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.



With a world-class measurement and testing laboratory encompassing a wide range of areas of computer science, mathematics, statistics, and systems engineering, NIST’s cybersecurity program supports its overall mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through research and development in ways that enhance economic security and improve our quality of life. 

The need for cybersecurity standards and best practices that address interoperability, usability, and privacy continues to be critical for the nation. NIST’s cybersecurity programs seek to enable greater development and application of practical, innovative security technologies and methodologies that enhance the country’s ability to address current and future computer and information security challenges. 

NIST develops cybersecurity standards, guidelines, best practices, and resources to meet the needs of U.S. industry, federal agencies, and the broader public. We carry out cybersecurity assignments defined by federal statutes, executive orders, and policies—including developing cybersecurity standards and guidelines for federal agencies. We also work closely with organizations in the public and private sectors to ensure that our information can be readily leveraged to address specific issues that they face.

Some of our primary areas of focus are highlighted in our Vitals Fact Sheets:

The Research

Projects & Programs

Trustworthy Networks of Things

NIST is working with industry to design, standardize, test and foster adoption of network-centric approaches to protect IoT devices from the Internet and to

Additional Resources Links


cityscape with icons representing various IOT technologies

Lightweight Crypto, Heavyweight Protection

Logic puzzles, brain teasers and mathematical riddles fascinated me throughout my childhood, so I feel lucky that I ended up with a career that never lacks for mathematical challenges. Part of my job at the National Institute of Standards and Technology (NIST) involves reviewing the cryptographic algorithms developed to protect our information and identifying possible weaknesses that make them
Graph from NIST RPKI Monitor

NIST Releases Measurement Tool for Emerging BGP Security Technologies

A person puts a hotel card key into a door lock; title says: Securing Property Management Systems

NIST Offers Cybersecurity Guide Tailored to the Hospitality Industry

Two cell phones with equations on the screens

NIST Develops Privacy-Preserving ‘Encounter Metrics’ That Could Help Slow Down Future Pandemics 

Cybersecurity Insights Blog

Differentially Private Synthetic Data

In this series, we've examined several different ways to answer queries over data using differential privacy. So far each approach requires changing the way we

Stay in Touch

Sign up for our newsletter to stay up to date with the latest research, trends, and news for Cybersecurity.


Third PQC Standardization Conference

Mon, Jun 7 2021, 10:00am - Wed, Jun 9 2021, 4:00pm EDT
The NIST Post-Quantum Cryptography Standardization Process has entered the third phase, in which 7 third round finalists