An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report ( NISTIR) 8334, Using Mobile
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NISTIR 8320, Hardware-Enabled Security: Enabling a Layered Approach to
NIST’s National Cybersecurity Center of Excellence (NCCoE) has published NIST Cybersecurity Practice Guide Special Publication (SP) 1800-15, Securing Small
Network-layer onboarding of an Internet of Things (IoT) device is the provisioning of network credentials to that device. The current lack of trusted IoT device
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Data Classification Practices: Facilitating Data-Centric
The National Institute of Standards and Technology (NIST) will host a virtual workshop on June 2 and 3, 2021 to enhance the security of the software supply
NIST announces the publication of a Cybersecurity White Paper on confidence mechanisms for Internet of Things (IoT) devices, Establishing Confidence in IoT
Announcing The FISSEA Summer Forum The FISSEA Forums are quarterly meetings to provide opportunities for policy and programmatic updates, the exchange of best
Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are
NIST is in the process of a periodic review and maintenance of its cryptography standards and NIST Special Publications. A description of the review process is
NIST's National Cybersecurity Center of Excellence (NCCoE) has released the second draft of NIST Special Publication (SP) 1800-30, Securing Telehealth Remote
NIST is planning to update NIST Special Publication (SP) 800-66, Revision 1, An Introductory Resource Guide for Implementing the Health Insurance Portability
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are
The National Cybersecurity Center of Excellence (NCCoE) has released the final version of the NIST Cybersecurity White Paper, Getting Ready for Post-Quantum
Unveiled today at the Federal Cybersecurity Workforce Summit, CyberSeek™ has expanded and updated its resources in its ongoing effort to close the cybersecurity
The protection of controlled unclassified information (CUI) in nonfederal systems and organizations—especially CUI associated with a critical program or high
NIST has released a new version of its measurement tools aimed at improving trust and confidence in emerging technologies for improving the security and
The Spring 2021 NICE eNewsletter is available now. The NICE eNewsletter is published quarterly to provide information on academic, industry, and government
Today marks the kick off of the inaugural US Cyber Games™ led by Katzcy, in cooperation with the National Initiative for Cybersecurity Education (NICE) program
Digital twin technology is an emerging area of research and standardization. Because of this, there may be a lack of clarity as to what is new with digital
We Want to Hear from You! The public comment period for draft NISTIR 8355, NICE Framework Competencies: Assessing Learners for Cybersecurity Work , and the
CALL FOR PROPOSALS is open now through June 18 “Broadening the Path to Cybersecurity Careers Through K12 Education” We encourage proposals from a diverse array
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Automation of the Cryptographic Module Validation Program
Information security continuous monitoring (ISCM) programs provide an understanding of risk tolerance and help officials set priorities and consistently manage