Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

black background. light blue shield in the middle. circle of hashmarks and triangles around the shield.

Cybersecurity and privacy

NIST develops cybersecurity and privacy standards, guidelines, best practices, and resources to meet the needs of U.S. industry, federal agencies, and the broader public. Our activities range from producing specific information that organizations can put into practice immediately to longer-term research that anticipates future challenges and technological advancements.

Our cybersecurity and privacy work is driven by the needs of U.S. industry and the broader public — and is sometimes defined by federal statutes, executive orders, and policies. NIST also advances the understanding and improves the management of privacy risks — some of which relate directly to cybersecurity.

We engage vigorously with stakeholders to set priorities and ensure that our resources address key issues that they face. Priority areas to which NIST contributes include:

The President’s Executive Order (EO) on Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 issued on June 6, 2025, charges multiple agencies – including NIST – to strengthen the nation’s cybersecurity by focusing on critical protections against foreign cyber threats and enhancing secure technology practices. Learn more about NIST responsibilities outlined in the EO.

News and Updates

NIST Revises Security and Privacy Control Catalog to Improve Software Update and Patch Releases

Empowering Future Innovators: NIST CTL Connects Cybersecurity Students with Real-World Research

NIST Guidelines Can Help Organizations Detect Face Photo Morphs, Deter Identity Fraud

Explainers

How Do I Create a Good Password?

What Is Quantum Cryptography? 

What Is Post-Quantum Cryptography? 

View cybersecurity and privacy publications View cybersecurity and privacy research projects View upcoming cybersecurity and privacy events

Videos

Protecting Your Small Business: Ransomware

Protecting Your Small Business: Ransomware

Protecting Your Small Business: Phishing

Protecting Your Small Business: Phishing

The NIST Cybersecurity Framework (CSF) 2.0

The NIST Cybersecurity Framework (CSF) 2.0

Blog Posts

7 Tips to Keep Your Smart Home Safer and More Private, From a NIST Cybersecurity Researcher

Cybersecurity Careers Go Beyond Coding

‌A Summer of Studying Cybersecurity — and Human Error’s Role in Attacks

Cybersecurity Insights Blog

Celebrating 1 Year of CSF 2.0

It has been one year since the release of the NIST Cybersecurity Framework (CSF) 2.0 ! To make improving your security posture even easier, in this blog we are
View cybersecurity and privacy patents
Was this page helpful?