An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The White House has announced a new 5-year STEM strategy, Charting a Course for Success: America’s Strategy for STEM Education.
NICE Interagency Coordinating...
NIST invites comments on Draft NISTIR 8196, Security Analysis of First Responder Mobile and Wearable Devices, which reviews the current and potential use cases...
Between 2014 and 2018, facial recognition software got 20 times better at searching a database to find a matching photograph, according to the National...
NIST has released a preliminary draft of NIST Special Publication (SP) 1800-19 Volume B, Trusted Cloud: Security Practice Guide for VMWare Hybrid Cloud...
NIST invites public comments on a second draft of Special Publication (SP) 800-57 Part 2 Rev. 1, Recommendation for Key Management Part 2: Best Practices for...
The National Cybersecurity Center of Excellence (NCCoE) at NIST is seeking comments on a draft project description, Securing Telehealth Remote Patient...
Comment Period Extended: Comments on Draft NISTIR 7298 Rev. 3 and the Online Glossary are now due by December 21, 2018 (the original due date was Nov. 30)...
YOU'RE INVITED! NCCAW IS HERE! National Cybersecurity Career Awareness Week (NCCAW), brought to you by the National Initiative for Cybersecurity (NICE), is a...
MIAMI—Employer demand for cybersecurity professionals across the United States continues to accelerate, according to new data published today on CyberSeek™, a...
Many manufacturing organizations leverage industrial control systems (ICS) to monitor and control physical processes. As ICS continue to adopt standard...
NIST invites comments on Draft Special Publication (SP) 800-179 Revision 1, Guide to Securing macOS 10.12 Systems for IT Professionals: A NIST Security...
In recognition of October as National Cybersecurity Awareness Month, the NICE Workforce Management subworking group we co-lead has released a guidebook, “...
National Cyber Security Awareness Month (NCSAM) – observed every October – was created to ensure every American has the resources they need to stay safer and...
The full agenda for the 2018 NICE K12 Cybersecurity Education Conference has been announced!
Join us for the conference on December 3-4, 2018 at the Grand...
The NCCoE published its first draft of the NIST SP 1800-18, Privileged Account Management for the Financial Services Sector . Comments are being accepted from...
The Fall 2018 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the National...
To help organizations address the cybersecurity and privacy threats against Internet of Things (IoT) devices, the National Institute of Standards and Technology...
INNOVATIONS IN CYBERSECURITY EDUCATION, TRAINING, AND WORKFORCE DEVELOPMENT NICE Conference and Expo November 6-7, 2018 Hyatt Regency Miami Miami, Florida The...
The 15th annual National Cybersecurity Awareness Month (NCSAM) will highlight cybersecurity user awareness among consumers, students/academia and business...
GAITHERSBURG, Md.—The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has released a study that estimates a $250 billion...
NIST has released Draft NIST Internal Report (NISTIR) 8222, Internet of Things (IoT) Trust Concerns, which identifies seventeen technical trust-related issues...
GAITHERSBURG, Md. – Innovative technologies such as the “internet of things” (IoT) and artificial intelligence enhance convenience, efficiency and economic...
We are excited to announce the release of draft National Institute of Standards and Technology (NIST) Special Publication 1800-14: Protecting the Integrity of...
NIST has initiated a process to solicit, evaluate, and standardize lightweight cryptographic algorithms that are suitable for use in constrained environments...