An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Digital twin technology is an emerging area of research and standardization. Because of this, there may be a lack of clarity as to what is new with digital...
We Want to Hear from You! The public comment period for draft NISTIR 8355, NICE Framework Competencies: Assessing Learners for Cybersecurity Work , and the...
CALL FOR PROPOSALS is open now through June 18 “Broadening the Path to Cybersecurity Careers Through K12 Education” We encourage proposals from a diverse array...
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Automation of the Cryptographic Module Validation Program...
Information security continuous monitoring (ISCM) programs provide an understanding of risk tolerance and help officials set priorities and consistently manage...
In recent years criminals and other attackers have compromised the networks of several major hospitality companies, exposing the information of hundreds of...
A new practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable...
To help secure our elections, NIST has released Draft NISTIR 8310, Cybersecurity Framework Election Infrastructure Profile. This Profile provides a voluntary...
NIST has completed the review of the second-round candidates in NIST's lightweight cryptography standardization process. After careful consideration, the ten...
When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part of...
Making elections secure means protecting against ever-evolving threats to information technology — which scans in-person and mail-in ballots, supports voter...
NIST announces the release of Draft NIST Internal Report (NISTIR) 8360, Machine Learning for Access Control Policy Verification. Access control policy...
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, the National Institute of...
Many organizations now support their employees' use of personal mobile devices to remotely perform work-related activities. This increasingly common practice...
The National Initiative for Cybersecurity Education (NICE) has released draft supplemental content to the Workforce Framework for Cybersecurity (NICE Framework)...
Call for Comments: Please send comments on draft NISTIR 8355 and the draft List of Competencies to NICEFramework [at] nist.gov (NICEFramework[at]nist[dot]gov) no later than 11:59pm. ET on May 3...
Network-layer onboarding of an Internet of Things (IoT) device is the provisioning of network credentials to that device. The current lack of trusted IoT device...
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Addressing Visibility Challenges with TLS 1.3. Publication...
For a second year, the NICE K12 Cybersecurity Education Conference will be a fully virtual event. In an effort to be mindful of health concerns, travel...
A new publication from the National Institute of Standards and Technology (NIST) provides companies, government agencies, and other organizations with a set of...
Whether it’s a new set of solar panels glistening on a neighbor’s roof or a freshly installed smart thermostat at home, burgeoning renewable and smart...
After careful thought and consideration, we’ve decided to reconsider the timing of the annual NICE Conference and permanently schedule the conference for the...
ANNOUNCING NICE FRAMEWORK SUCCESS STORIES The National Initiative for Cybersecurity Education (NICE) Workforce Framework for Cybersecurity (NICE Framework)...
NIST announces the release of NISTIR 8276 , Key Practices in Cyber Supply Chain Risk Management (C-SCRM): Observations from Industry. This final document...
As part of an effort to help users apply its well-known Cybersecurity Framework (CSF) as broadly and effectively as possible, the National Institute of...