Movatterモバイル変換


[0]ホーム

URL:


Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A.gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
Alock (LockA locked padlock) orhttps:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/cybersecurity-and-privacy

National Institute of Standards and Technology
National Institute of Standards and Technology
black background. light blue shield in the middle. circle of hashmarks and triangles around the shield.

Cybersecurity and privacy

NIST develops cybersecurity and privacy standards, guidelines, best practices, and resources to meet the needs of U.S. industry, federal agencies, and the broader public. Our activities range from producing specific information that organizations can put into practice immediately to longer-term research that anticipates future challenges and technological advancements.

Our cybersecurity and privacy work is driven by the needs of U.S. industry and the broader public — and is sometimes defined by federal statutes, executive orders, and policies. NIST also advances the understanding and improves the management of privacy risks — some of which relate directly to cybersecurity.

Weengage vigorously with stakeholders to set priorities and ensure that our resources address key issues that they face. Priority areas to which NIST contributes include:

The President’s Executive Order (EO) on Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 issued on June 6, 2025, charges multiple agencies – including NIST – to strengthen the nation’s cybersecurity by focusing on critical protections against foreign cyber threats and enhancing secure technology practices.Learn more about NIST responsibilities outlined in the EO.

News and Updates

A young male teacher stands at the front of a darkened classroom, pointing at computer code on a large screen.

NIST Awards More Than $3 Million to Support Cybersecurity Workforce Development Across 13 States

A laptop screen displays the words “software update” with a progress bar.

NIST Revises Security and Privacy Control Catalog to Improve Software Update and Patch Releases

Empowering Future Innovators: NIST CTL Connects Cybersecurity Students with Real-World Research

Empowering Future Innovators: NIST CTL Connects Cybersecurity Students with Real-World Research

Explainers

A computer screen shows a password field box with characters hidden by asterisks.

How Do I Create a Good Password?

Illustration with icons including keys, atoms, padlocks and lines of computer code.

What Is Quantum Cryptography? 

Illustration in blue tones shows a tree on the left with algorithms and lattice images on right.

What Is Post-Quantum Cryptography? 

View cybersecurity and privacy publicationsView cybersecurity and privacy research projectsView upcoming cybersecurity and privacy events

Videos

Protecting Your Small Business: Ransomware

Protecting Your Small Business: Ransomware

Protecting Your Small Business: Phishing

Protecting Your Small Business: Phishing

The NIST Cybersecurity Framework (CSF) 2.0

The NIST Cybersecurity Framework (CSF) 2.0

Blog Posts

Julie Haney sits at a table in the NIST library with a laptop, looking at a smartphone in her hand.

7 Tips to Keep Your Smart Home Safer and More Private, From a NIST Cybersecurity Researcher

Blonde woman in black top sitting at desk with laptop across from man in blue shirt

Cybersecurity Careers Go Beyond Coding

Miles Walker poses smiling in front of the spiral staircase in the NIST library.

‌A Summer of Studying Cybersecurity — and Human Error’s Role in Attacks

Cybersecurity Insights Blog

Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers

Update: The comment period for your feedback on the second public draft of NIST IR 8259 has been extended through December 10, 2025. Over the past few months

Let’s get Digital! Updated Digital Identity Guidelines are Here!

Today is the day! Digital Identity Guidelines, Revision 4 is finally here...it’s been an exciting journey and NIST is honored to be a part of it. What can we

Reflections from the First Cyber AI Profile Workshop

Thank you to everyone who participated in the Cyber AI Profile Workshop NIST hosted this past April! This work intends to support the cybersecurity and AI

Nine Years and Counting: NICE RAMPS Communities Keep Expanding Opportunities in Cybersecurity Work and Learning

A lot has changed in America’s cybersecurity workforce development ecosystem since 2016: employment in cybersecurity occupations has grown by more than 300,000

The Impact of Artificial Intelligence on the Cybersecurity Workforce

The NICE Workforce Framework for Cybersecurity ( NICE Framework) was revised in November 2020 as NIST Special Publication 800-181 rev.1 to enable more effective

Cybersecurity and AI: Integrating and Building on Existing NIST Guidelines

What is NIST up to? On April 3, 2025, NIST hosted a Cybersecurity and AI Profile Workshop at our National Cybersecurity Center of Excellence (NCCoE) to hear

Five Years Later: Evolving IoT Cybersecurity Guidelines

The Background…and NIST’s Plan for Improving IoT Cybersecurity The passage of the Internet of Things (IoT) Cybersecurity Improvement Act in 2020 marked a

Small Businesses Create Big Impact: NIST Celebrates 2025 National Small Business Week

This week we’re celebrating National Small Business Week—which recognizes and celebrates the small and medium-sized business (SMB) community’s significant

Celebrating 1 Year of CSF 2.0

It has been one year since the release of the NIST Cybersecurity Framework (CSF) 2.0 ! To make improving your security posture even easier, in this blog we are

Privacy-Preserving Federated Learning – Future Collaboration and Continued Research

This post is the final blog in a series on privacy-preserving federated learning . The series is a collaboration between NIST and the UK government’s

NIST’s International Cybersecurity and Privacy Engagement Update – New Translations

As the year comes to a close, NIST continues to engage with our international partners to strengthen cybersecurity, including sharing over ten new international

Data Pipeline Challenges of Privacy-Preserving Federated Learning

This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK government’s Responsible

Kicking-Off with a December 4th Workshop, NIST is Revisiting and Revising Foundational Cybersecurity Activities for IoT Device Manufacturers, NIST IR 8259!

In May 2020, NIST published Foundational Cybersecurity Activities for IoT Device Manufacturers (NIST IR 8259), which describes recommended cybersecurity

Unlocking Cybersecurity Talent: The Power of Apprenticeships

Cybersecurity is a fast-growing field, with a constant need for skilled professionals. But unlike other professions — like medicine or aviation — there’s no

Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem

If you are interested in the world of digital identities, you have probably heard some of the buzzwords that have been floating around for a few years now…
View cybersecurity and privacy patents
Was this page helpful?

[8]ページ先頭

©2009-2025 Movatter.jp