Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 101 through 125 of 1413 matching records.
Updates

Now Available for Comment: White Paper on Migration to Post-Quantum Cryptography (PQC)

September 18, 2025
https://csrc.nist.gov/news/2025/pqc-migration-mappings-to-risk-framework-documents

The NIST National Cybersecurity Center of Excellence (NCCoE) has published an initial public draft of NIST Cybersecurity White Paper (CSWP) 48, "Mappings of Migration to PQC Project Capabilities to Risk Framework Documents." Comments are due October 20, 2025.

Publications CSWP 48 (Initial Public Draft)

Mappings of Migration to PQC Project Capabilities to NIST Cybersecurity Framework 2.0 and to Security and Privacy Controls for Information Systems and Organizations

September 18, 2025
https://csrc.nist.gov/pubs/cswp/48/mapping-migration-to-pqc-project-capabilities-to-r/ipd

Abstract: The capabilities demonstrated by the NCCoE Migration to Post-Quantum Cryptography project support several security objectives and controls identified by the NIST Cybersecurity Framework 2.0 (CSWP 29) and Security and Privacy Controls for Information Systems and Organizations (SP 800-53), respectivel...

Projects

Cybersecurity Framework

https://csrc.nist.gov/projects/cybersecurity-framework

[Redirect to https://www.nist.gov/cyberframework] The Cybersecurity Framework is voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders. *Federal agencies do have requirements to implement the Cybersecurity Framework; see the <U.S. Federal Agency Use FAQs> for more information.

Updates

Addressing Visibility Challenges with TLS 1.3 within the Enterprise: NIST Publishes SP 1800-37

September 17, 2025
https://csrc.nist.gov/news/2025/addressing-visibility-challenges-tls-1-3

The final release of Special Publication 1800-37, Addressing Visibility Challenges with TLS 1.3 within the Enterprise, is now available.

Publications SP 1800-37 (Final)

Addressing Visibility Challenges with TLS 1.3 within the Enterprise: High-Level Document

September 17, 2025
https://csrc.nist.gov/pubs/sp/1800/37/final

Abstract: The Transport Layer Security (TLS) protocol is widely deployed to secure network traffic. TLS 1.3 protects the contents of its previous TLS communications even if a TLS-enabled server is compromised. This is known as forward secrecy. The approach used to achieve forward secrecy in TLS 1.3 may...

Events

FORUM Meeting - September 16, 2025

September 16, 2025 - September 16, 2025
https://csrc.nist.gov/events/2025/forum-meeting-september-16-2025

The Federal Cybersecurity & Privacy Professionals Forum is an informal group sponsored by the National Institute of Standards and Technology (NIST) to promote the sharing of system security and privacy information among federal, state, and local government, and higher education employees. The Forum maintains an extensive Email list and holds quarterly meetings to discuss current issues and items of interest to those responsible for protecting non-national security systems. For more information about the Forum and instructions on how to join, see: https://csrc.nist.gov/Projects/forum. A...

Updates

Virtual Event: Learn more about the new NIST SP 800-53 Control Overlays for Securing AI Systems Project

September 16, 2025
https://csrc.nist.gov/news/2025/webinar-nist-security-control-overlays-for-ai-syst

This webinar presents a new project to develop NIST security control overlays for AI systems. These overlays adapt, tailor, and supplement the SP 800-53 controls to address AI-specific concerns, such as model integrity, data provenance, adversarial robustness, and transparency without reinventing the wheel.

Updates

Automation of the NIST CMVP: Draft April Status Report

September 10, 2025
https://csrc.nist.gov/news/2025/automation-of-nist-cmvp-april-status-report

The initial public draft of NIST Cybersecurity White Paper (CSWP) 37B, Automation of the NIST Cryptographic Module Validation Program: April 2025 Status Report, is now available for public comment through October 10, 2025.

Publications CSWP 37B (Initial Public Draft)

Automation of the NIST Cryptographic Module Validation Program: April 2025 Status Report

September 10, 2025
https://csrc.nist.gov/pubs/cswp/37/b/automation-of-the-nist-cmvp-april-2025/ipd

Abstract: The Cryptographic Module Validation Program (CMVP) validates third-party assertions that cryptographic module implementations satisfy the requirements of Federal Information Processing Standards (FIPS) Publication 140-3, Security Requirements for Cryptographic Modules. The current cryptographic modu...

Projects

Ransomware Protection and Response

https://csrc.nist.gov/projects/ransomware-protection-and-response

Thanks for helping shape our ransomware guidance! We've published an initial public draft of NISTIR 8374 Revision 1, Ransomware Risk Management: A Cybersecurity Framework Profile. It reflects changes made to the Cybersecurity Framework (CSF) from CSF 1.1 to CSF 2.0 which identifies security objectives that support managing, detecting, responding to, and recovering from ransomware events. The public comment period is open until September 11, 2025 March 14, 2025. Please send your feedback about this initial public draft and what content would be most valuable in future NIST ransomware guidance...

Updates

NIST Publishes Report on Digital Product Cybersecurity Education and Awareness for Design-A-Thon Event

September 3, 2025
https://csrc.nist.gov/news/2025/nist-publishes-ir-8558-report-on-the-design-a-thon

NIST has published Internal Report (IR) 8558, Report on the Design-A-Thon: Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.

Publications IR 8523 (Final)

Multi-Factor Authentication for Criminal Justice Information Systems: Implementation Considerations for Protecting Criminal Justice Information

September 3, 2025
https://csrc.nist.gov/pubs/ir/8523/final

Abstract: Most recent cybersecurity breaches have involved compromised credentials. Migrating from single-factor to multi-factor authentication (MFA) reduces the risk of compromised credentials and unauthorized access. Both criminal and noncriminal justice agencies need to access criminal justice information...

Publications IR 8558 (Final)

Report on the Design-A-Thon: Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness

September 3, 2025
https://csrc.nist.gov/pubs/ir/8558/final

Abstract: This report documents the first SOUPS Design-A-Thon, which was held on August 11th, 2024, and focused on Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness. In total, eight individuals participated in the event, forming three teams. The teams each...

Updates

Methodology for Characterizing IoT Device Network Behavior: NIST IR 8349

August 28, 2025
https://csrc.nist.gov/news/2025/iot-device-network-behavior-nist-ir-8349

NIST’s National Cybersecurity Center of Excellence (NCCoE) has published NIST Internal Report (NIST IR) 8349: Methodology for Characterizing Network Behavior of Internet of Things Devices.

Updates

NIST Releases Revision to SP 800-53 Security and Privacy Controls

August 27, 2025
https://csrc.nist.gov/news/2025/nist-releases-revision-to-sp-800-53-controls

NIST has issued Special Publication (SP) 800-53 Release 5.2.0, Security and Privacy Controls for Information Systems and Organizations.

Project Pages

Authentication

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/authentication

Authentication mechanisms such as passwords and multi-factor authentication methods (e.g., smart cards and tokens) provide examples of the challenges involved in creating usable cybersecurity solutions. Our research explores the usage and usability of authentication mechanisms. We focus on how these mechanisms can be improved to aid in their correct, secure employment by different user populations while avoiding user frustration and circumvention. Also see our Youth Security & Privacy research area for publications related to youth passwords. Publications Digital Identity Guidelines...

Updates

NIST SP 1331 ipd - Quick-Start Guide for Using CSF 2.0 to Improve Management of Emerging Cybersecurity Risks

August 21, 2025
https://csrc.nist.gov/news/2025/nist-sp-1331-ipd-draft-released-for-public-comme

NIST SP 1331 ipd highlights the topic of emerging cybersecurity risks and explains how organizations can improve their ability to address such risks through existing practices within the cyber risk discipline in conjunction with the NIST Cybersecurity Framework (CSF) 2.0. The comment period is open through September 21, 2025.

Publications SP 1331 (Initial Public Draft)

Quick-Start Guide for Using CSF 2.0 to Improve Management of Emerging Cybersecurity Risks

August 21, 2025
https://csrc.nist.gov/pubs/sp/1331/ipd

Abstract: This Quick-Start Guide introduces the topic of emerging cybersecurity risks and illustrates how organizations can improve their ability to address such risks through existing practices within the NIST Cybersecurity Framework (CSF) 2.0. The guide also emphasizes the importance of integrating these pr...

Updates

Comment on Draft NIST CSWP 51 ipd

August 20, 2025
https://csrc.nist.gov/news/2025/comment-on-draft-nist-cswp-51-ipd

The NIST National Cybersecurity Center of Excellence (NCCoE) has published NIST Cybersecurity White Paper (CSWP) 51, Developing a Transit Cybersecurity Framework Community Profile.

<< first   < previous   1     2     3     4     5     6     7     8     9     10     11     12     13     14     15     16     17     18     19     20     21     22     23     24     25  next >  last >>