An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The United States continues to have complete dependence on information technology deployed in critical infrastructure systems and applications in both the...
Congratulations to Mr. Michael Petock, U.S. Department of State, for being awarded the Federal Information Systems Security Educator’s Association (FISSEA)...
In celebration of Women’s History Month, the Federal CIO Council Workforce Committee is pleased to host its first-ever Women in Federal IT and Cybersecurity...
The National CyberWatch Center has recently updated their Guide for Mapping Courses to Knowledge Units. The guide, now in version 2, provides detailed...
NIST released, for public comment, the final draft of Assessing Security Requirements for Controlled Unclassified Information (NIST SP 800-171A), a publication...
NIST releases National Checklist Program for IT Products – Guidelines for Checklist Users and Developers (NIST SP 800-70 Revision 4), a report that explains how...
NIST publishes The Technical Specification for the Security Content Automation Protocol (SCAP) (NIST SP 800-126 Rev. 3) and an annex to this publication, SCAP 1...
NIST publishes Attribute Metadata: A Proposed Schema for Evaluating Federated Attributes (NIST Internal Report 8112), which contains an attribute that can be...
The Winter 2018 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the...
The cybersecurity field is suffering from a severe shortage in talent, with an estimated 285,681 job openings today according to CyberSeek – an interactive...
Beguiling, baffling or both—that’s blockchain. Aiming to clarify the subject for the benefit of companies and other organizations, the National Institute of...
NIST announces the release of Special Publication 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation. This Recommendation specifies...
The National Science Foundation (NSF) has introduced for the first time, the CyberCorps: Scholarship for Service (SFS) Hall of Fame. The SFS Hall of Fame...
Establishing capability indicators that can help organizations build formal qualification requirements for each NICE Cybersecurity Workforce Framework work role...
NIST published the second draft of the proposed update to the Framework for Improving Critical Infrastructure Cybersecurity . This second draft update aims to...
It’s crunch time for government contractors. They only have until Dec. 31, 2017, to demonstrate they are providing appropriate cybersecurity for a class of...
On Monday, November 13, 2017, the First Annual National Cybersecurity Career Awareness Week began with a kick-off event at the National Cybersecurity Center of...
Electronic messages traveling across the internet are under constant threat from data thieves, but new security standards created with the technical...
We invite you to join us in observing the First Annual National Cybersecurity Career Awareness Week November 13-18, 2017 The National Cybersecurity Career...
The Fall 2017 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the National...
The National Institute of Standards and Technology (NIST) and the Department of Homeland Security (DHS) will jointly sponsor the 2018 Global City Teams...
We are pleased to announce that the full agenda for the NICE Conference & Expo has been announced! Join us for the 8th Annual NICE Conference on November 7-8...
On August 17th, Representative Norma Torres (CA35) convened a panel on how local governments can prepare for cybersecurity attacks. Attendees included local law...
Information systems—from communications platforms to internet-connected devices—require both security and privacy safeguards to work successfully and protect...