Movatterモバイル変換


[0]ホーム

URL:


Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A.gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
Alock (LockA locked padlock) orhttps:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/cybersecurity-and-privacy

National Institute of Standards and Technology
National Institute of Standards and Technology
black background. light blue shield in the middle. circle of hashmarks and triangles around the shield.

Cybersecurity and privacy

NIST develops cybersecurity and privacy standards, guidelines, best practices, and resources to meet the needs of U.S. industry, federal agencies, and the broader public. Our activities range from producing specific information that organizations can put into practice immediately to longer-term research that anticipates future challenges and technological advancements.

Our cybersecurity and privacy work is driven by the needs of U.S. industry and the broader public — and is sometimes defined by federal statutes, executive orders, and policies. NIST also advances the understanding and improves the management of privacy risks — some of which relate directly to cybersecurity.

Weengage vigorously with stakeholders to set priorities and ensure that our resources address key issues that they face. Priority areas to which NIST contributes include:

The President’s Executive Order (EO) on Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 issued on June 6, 2025, charges multiple agencies – including NIST – to strengthen the nation’s cybersecurity by focusing on critical protections against foreign cyber threats and enhancing secure technology practices.Learn more about NIST responsibilities outlined in the EO.

News and Updates

Nine images in a grid invoke cutting-edge technologies in bioscience, communications, energy, navigation and other fields.

NIST Allocates Over $3 Million to Small Businesses Advancing AI, Biotechnology, Semiconductors, Quantum and More

Boxes on a conveyor belt in a warehouse are overlaid with icons representing transportation and logistics.

NIST Launches Centers for AI in Manufacturing and Critical Infrastructure

A cylindrical smart speaker sits on a wooden table in a living room.

Securing Smart Speakers for Home Health Care: NIST Offers New Guidelines 

Explainers

A computer screen shows a password field box with characters hidden by asterisks.

How Do I Create a Good Password?

Illustration with icons including keys, atoms, padlocks and lines of computer code.

What Is Quantum Cryptography? 

Illustration in blue tones shows a tree on the left with algorithms and lattice images on right.

What Is Post-Quantum Cryptography? 

View cybersecurity and privacy publicationsView cybersecurity and privacy research projectsView upcoming cybersecurity and privacy events

Videos

Protecting Your Small Business: Ransomware

Protecting Your Small Business: Ransomware

Protecting Your Small Business: Phishing

Protecting Your Small Business: Phishing

The NIST Cybersecurity Framework (CSF) 2.0

The NIST Cybersecurity Framework (CSF) 2.0

Blog Posts

Ram Sriram poses smiling for a head shot outdoors on the NIST campus.

AI in the Doctor’s Office: How Standards Can Support Trustworthiness

Close-up of a smartphone held in a person's hand, showing a Colorado mobile driver's license with an image of a bighorn sheep.

Tap for ID: Your Next Driver’s License Might Also Live on Your Phone

Julie Haney sits at a table in the NIST library with a laptop, looking at a smartphone in her hand.

7 Tips to Keep Your Smart Home Safer and More Private, From a NIST Cybersecurity Researcher

Cybersecurity Insights Blog

Celebrating Data Privacy Week with NIST’s Privacy Engineering Program

Grab your party hats – it’s Data Privacy Week! Data Privacy Week is a global initiative led by the National Cybersecurity Alliance to spread awareness about

Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem

Understanding mDL credential formats Standards in the VDC Ecosystem In our first blog post in this series, we highlighted that VDCs can represent a wide range

A NICE Retrospective on Shaping Cybersecurity’s Future

Rodney Petersen has served as the Director of NICE at the National Institute for Standards and Technology (NIST) for the past eleven years where his focus has

Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers

Update: The comment period for your feedback on the second public draft of NIST IR 8259 has been extended through December 10, 2025. Over the past few months
View cybersecurity and privacy patents
Was this page helpful?

[8]ページ先頭

©2009-2026 Movatter.jp