Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 76 through 100 of 1415 matching records.
Updates

Virtual Event: Learn more about the new NIST SP 800-53 Control Overlays for Securing AI Systems Project

September 16, 2025
https://csrc.nist.gov/news/2025/webinar-nist-security-control-overlays-for-ai-syst

This webinar presents a new project to develop NIST security control overlays for AI systems. These overlays adapt, tailor, and supplement the SP 800-53 controls to address AI-specific concerns, such as model integrity, data provenance, adversarial robustness, and transparency without reinventing the wheel.

Project Pages

Phishing

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/phishing

Short URL: https://csrc.nist.gov/phishing Phishing continues to be an escalating cyber threat facing organizations of all types and sizes, including industry, academia, and government. Our team performs research to understand phishing within an operational (real-world) context by examining user behaviors during phishing awareness training exercises. Our projects provide insights into users’ rationale and role in early detection, and how these might be scaffolded with technological solutions. Recent efforts have focused on the NIST Phish Scale, a method for rating the human detection...

Projects

Hardware Security

https://csrc.nist.gov/projects/hardware-security

Proposed Activities | Previous and Current Activities | Contact Us Semiconductor-based hardware is the foundation of modern-day electronics. Electronics are ubiquitous in our daily lives: from smartphones, computers, and telecommunication to transportation and critical infrastructure like power grids and waterways. The semiconductor hardware supply chain is a complex network consisting of many companies that collectively provide intellectual property, create designs, provide raw materials, and manufacture, test, package, and distribute products. Coordination among these companies is...

Updates

Automation of the NIST CMVP: Draft April Status Report

September 10, 2025
https://csrc.nist.gov/news/2025/automation-of-nist-cmvp-april-status-report

The initial public draft of NIST Cybersecurity White Paper (CSWP) 37B, Automation of the NIST Cryptographic Module Validation Program: April 2025 Status Report, is now available for public comment through October 10, 2025.

Publications CSWP 37B (Initial Public Draft)

Automation of the NIST Cryptographic Module Validation Program: April 2025 Status Report

September 10, 2025
https://csrc.nist.gov/pubs/cswp/37/b/automation-of-the-nist-cmvp-april-2025/ipd

Abstract: The Cryptographic Module Validation Program (CMVP) validates third-party assertions that cryptographic module implementations satisfy the requirements of Federal Information Processing Standards (FIPS) Publication 140-3, Security Requirements for Cryptographic Modules. The current cryptographic modu...

Projects

Ransomware Protection and Response

https://csrc.nist.gov/projects/ransomware-protection-and-response

Thanks for helping shape our ransomware guidance! We've published an initial public draft of NISTIR 8374 Revision 1, Ransomware Risk Management: A Cybersecurity Framework Profile. It reflects changes made to the Cybersecurity Framework (CSF) from CSF 1.1 to CSF 2.0 which identifies security objectives that support managing, detecting, responding to, and recovering from ransomware events. The public comment period is open until September 11, 2025 March 14, 2025. Please send your feedback about this initial public draft and what content would be most valuable in future NIST ransomware guidance...

Updates

NIST Publishes Report on Digital Product Cybersecurity Education and Awareness for Design-A-Thon Event

September 3, 2025
https://csrc.nist.gov/news/2025/nist-publishes-ir-8558-report-on-the-design-a-thon

NIST has published Internal Report (IR) 8558, Report on the Design-A-Thon: Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.

Publications IR 8523 (Final)

Multi-Factor Authentication for Criminal Justice Information Systems: Implementation Considerations for Protecting Criminal Justice Information

September 3, 2025
https://csrc.nist.gov/pubs/ir/8523/final

Abstract: Most recent cybersecurity breaches have involved compromised credentials. Migrating from single-factor to multi-factor authentication (MFA) reduces the risk of compromised credentials and unauthorized access. Both criminal and noncriminal justice agencies need to access criminal justice information...

Publications IR 8558 (Final)

Report on the Design-A-Thon: Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness

September 3, 2025
https://csrc.nist.gov/pubs/ir/8558/final

Abstract: This report documents the first SOUPS Design-A-Thon, which was held on August 11th, 2024, and focused on Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness. In total, eight individuals participated in the event, forming three teams. The teams each...

Updates

Methodology for Characterizing IoT Device Network Behavior: NIST IR 8349

August 28, 2025
https://csrc.nist.gov/news/2025/iot-device-network-behavior-nist-ir-8349

NIST’s National Cybersecurity Center of Excellence (NCCoE) has published NIST Internal Report (NIST IR) 8349: Methodology for Characterizing Network Behavior of Internet of Things Devices.

Updates

NIST Releases Revision to SP 800-53 Security and Privacy Controls

August 27, 2025
https://csrc.nist.gov/news/2025/nist-releases-revision-to-sp-800-53-controls

NIST has issued Special Publication (SP) 800-53 Release 5.2.0, Security and Privacy Controls for Information Systems and Organizations.

Project Pages

Authentication

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/authentication

Authentication mechanisms such as passwords and multi-factor authentication methods (e.g., smart cards and tokens) provide examples of the challenges involved in creating usable cybersecurity solutions. Our research explores the usage and usability of authentication mechanisms. We focus on how these mechanisms can be improved to aid in their correct, secure employment by different user populations while avoiding user frustration and circumvention. Also see our Youth Security & Privacy research area for publications related to youth passwords. Publications Digital Identity Guidelines...

Updates

NIST SP 1331 ipd - Quick-Start Guide for Using CSF 2.0 to Improve Management of Emerging Cybersecurity Risks

August 21, 2025
https://csrc.nist.gov/news/2025/nist-sp-1331-ipd-draft-released-for-public-comme

NIST SP 1331 ipd highlights the topic of emerging cybersecurity risks and explains how organizations can improve their ability to address such risks through existing practices within the cyber risk discipline in conjunction with the NIST Cybersecurity Framework (CSF) 2.0. The comment period is open through September 21, 2025.

Publications SP 1331 (Initial Public Draft)

Quick-Start Guide for Using CSF 2.0 to Improve Management of Emerging Cybersecurity Risks

August 21, 2025
https://csrc.nist.gov/pubs/sp/1331/ipd

Abstract: This Quick-Start Guide introduces the topic of emerging cybersecurity risks and illustrates how organizations can improve their ability to address such risks through existing practices within the NIST Cybersecurity Framework (CSF) 2.0. The guide also emphasizes the importance of integrating these pr...

Updates

Comment on Draft NIST CSWP 51 ipd

August 20, 2025
https://csrc.nist.gov/news/2025/comment-on-draft-nist-cswp-51-ipd

The NIST National Cybersecurity Center of Excellence (NCCoE) has published NIST Cybersecurity White Paper (CSWP) 51, Developing a Transit Cybersecurity Framework Community Profile.

Updates

Small Business Primer for Protecting Controlled Unclassified Information (CUI): NIST SP 800-171r3

August 18, 2025
https://csrc.nist.gov/news/2025/small-business-primer-for-protecting-cui

NIST has released a small business primer to supplement SP 800-171 revision 3, to help smaller, under-resourced organizations better protect Controlled Unclassified Information (CUI).

Publications SP 1318 (Final)

Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision 3. Small Business Primer

August 18, 2025
https://csrc.nist.gov/pubs/sp/1318/final

Abstract: This introductory guide provides small businesses with a high level overview of NIST Special Publication (SP) 800-171 Revision 3, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. The document is broken up into two separate sections. The first few pages provide...

Project Pages

NIST Overlays Securing AI Systems Slack Collaboration

https://csrc.nist.gov/projects/cosais/slack

COSAiS leverages a newly launched NIST Overlays for Securing AI Systems Slack Channel, a hub for the cybersecurity and AI communities to hold discussions related to the development of these overlays. Slack channel members get updates, engage in facilitated discussions with the NIST principal investigators and other subgroup members, share ideas, provide real-time feedback, and contribute to the development of the overlays! All interested parties are welcomed. Join the Slack channel Submit your request using the Google form. By joining the Slack channel, users agree to the rules outlined...

Project Pages

NIST-developed Overlay Submissions

https://csrc.nist.gov/projects/risk-management/sp800-53-controls/overlay-repository/nist-developed-overlay-submissions

NIST developed category consists of submissions developed by NIST staff or contractors. Select from overlays listed below for more information and to access the overlay. Overlay Name / Version Author / Point of Contact Technology or System Comment SP 800-82 v1 / Version 2 Author: Keith Stouffer PoC: Keith Stouffer x1234 Industrial Control System The FISMA Implementation Project was established in January 2003 to produce several key security standards and guidelines required by Congressional legislation. These publications include...

Updates

NIST Releases Control Overlays for Securing AI Systems Concept Paper

August 14, 2025
https://csrc.nist.gov/news/2025/control-overlays-for-securing-ai-systems

NIST has released a concept paper and proposed action plan for developing a series of NIST SP 800-53 Control Overlays for Securing AI Systems, as well as a launching a Slack channel for this community of interest.

Project Pages

Cybersecurity Adoption, Awareness, & Training

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/cybersecurity-adoption

People and organizations often fail to adopt and effectively use cybersecurity best practices and technologies for a variety of reasons, including lack of knowledge/skills. Those professionals tasked with educating others may likewise face a number of challenges, including lack of resources, support, and skills needed to be effective security communicators. We conduct research to better understand the approaches and challenges with cybersecurity awareness and role-based training through the eyes of training professionals within the U.S. government. In the recent past, we also explored...

Project Pages

Internet of Things

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/internet-of-things

Internet of Things (IoT) technology is becoming more pervasive in the home environment. These technologies are increasingly used by non-technical users who have little understanding of the technologies or awareness of the security and privacy implications of use. We conduct research to help improve consumers' security and privacy experiences and outcomes when using IoT, with a specific focus on smart home devices. Publications IoT Cybersecurity Labels Papers Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products - National Institute of...

<< first   < previous   1     2     3     4     5     6     7     8     9     10     11     12     13     14     15     16     17     18     19     20     21     22     23     24     25  next >  last >>