Cyber Security
Stay informed with the most recent tech news! Get your daily dose of updates here.
- Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturersby Barbara Cuthill, Michael Fagan (Cybersecurity Insights) on 30 September 2025 at 12:00
Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers (NIST IR 8259 Revision 1 Initial Public Draft), which describes recommended pre-market and post-market activities for manufacturers to develop products that meet their customers’ cybersecurity needs and expectations. Thank you so much for the thoughtful comments and feedback throughout this process; 400+ participants across industry, consumer organizations, academia, federal agencies, and researchers shared feedback in both the December 2024 and March 2025 workshops—as well as
- Let’s get Digital! Updated Digital Identity Guidelines are Here!by Ryan Galluzzo, Connie LaSalle, Andrew Regenscheid (Cybersecurity Insights) on 1 August 2025 at 12:00
Today is the day! Digital Identity Guidelines, Revision 4 is finally here...it’s been an exciting journey and NIST is honored to be a part of it. What can we expect? Serving as a culmination of a nearly four-year collaborative process that included foundational research, two public drafts, and about 6,000 individual comments from the public, Revision 4 of Special Publication 800-63, Digital Identity Guidelines, intends to respond to the changing digital landscape that has emerged since the last major revision of this suite, published in 2017. The guidelines presented in Revision 4 explain the
- Reflections from the First Cyber AI Profile Workshopby Katerina Megas, Julie Nethery Snyder , Bronwyn Patrick (Cybersecurity Insights) on 31 July 2025 at 12:00
Thank you to everyone who participated in the Cyber AI Profile Workshop NIST hosted this past April! This work intends to support the cybersecurity and AI communities — and the input you provided during this workshop is critical. We are working to publish a Workshop Summary that captures themes and highlights from the event. In the interim, we would like to share a preview of what we heard. Background on the Cyber AI Profile Workshop ( watch the workshop introduction video) As NIST began exploring the idea of a Cyber AI Profile and writing the Cybersecurity and AI Workshop Concept Paper
- Nine Years and Counting: NICE RAMPS Communities Keep Expanding Opportunities in Cybersecurity Work and Learningby Michael Prebil (Cybersecurity Insights) on 7 July 2025 at 12:00
A lot has changed in America’s cybersecurity workforce development ecosystem since 2016: employment in cybersecurity occupations has grown by more than 300,000 [1]; the number of information security degrees awarded annually has more than tripled to nearly 35,000 [2]; and a wide array of new technologies and risks have emerged. Five regional cybersecurity workforce partnerships supported by the 2016 RAMPS program pilot, administered by NIST’s NICE Program Office, have weathered the changes in cybersecurity and continue to anchor cybersecurity talent networks in their communities to this day
- The Impact of Artificial Intelligence on the Cybersecurity Workforceby Karen Wetzel (Cybersecurity Insights) on 12 June 2025 at 12:00
The NICE Workforce Framework for Cybersecurity ( NICE Framework) was revised in November 2020 as NIST Special Publication 800-181 rev.1 to enable more effective and rapid updates to the NICE Framework Components, including how the advent of emerging technologies would impact cybersecurity work. NICE has been actively engaging in conversations with: federal departments and agencies; industry; education, training, and certification providers; and international representatives to understand how Artificial Intelligence (AI) might affect the nature of our Nation’s digital work. NICE has also led
- Cybersecurity and AI: Integrating and Building on Existing NIST Guidelinesby Katerina Megas, Victoria Yan Pillitteri (Cybersecurity Insights) on 22 May 2025 at 12:00
What is NIST up to? On April 3, 2025, NIST hosted a Cybersecurity and AI Profile Workshop at our National Cybersecurity Center of Excellence (NCCoE) to hear feedback on our concept paper which presented opportunities to create profiles of the NIST Cybersecurity Framework (CSF) and the NIST AI Risk Management Framework (AI RMF). These would serve to support the cybersecurity community as they adopt AI for cybersecurity, need to defend against AI-enabled cybersecurity attacks, as well as protect AI systems as organizations adopt AI to support their business. Stay tuned for the soon to be
- Five Years Later: Evolving IoT Cybersecurity Guidelinesby Katerina Megas, Michael Fagan (Cybersecurity Insights) on 13 May 2025 at 12:00
The Background…and NIST’s Plan for Improving IoT Cybersecurity The passage of the Internet of Things (IoT) Cybersecurity Improvement Act in 2020 marked a pivotal step in enhancing the cybersecurity of IoT products. Recognizing the increasing internet connectivity of physical devices, this legislation tasked NIST with developing cybersecurity guidelines to manage and secure IoT effectively. As an early building block, we developed NIST IR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers, which describes recommended activities related to cybersecurity for manufacturers
- Small Businesses Create Big Impact: NIST Celebrates 2025 National Small Business Weekby Daniel Eliot (Cybersecurity Insights) on 5 May 2025 at 12:00
This week we’re celebrating National Small Business Week—which recognizes and celebrates the small and medium-sized business (SMB) community’s significant contributions to the nation. SMBs are a substantial and critical part of the U.S. and global economic and cybersecurity infrastructure. According to the U.S. Small Business Administration’s Office of Advocacy, [1] there are 34.8 million SMBs in the United States (making up 99% of all U.S. businesses). Of those, 81.7% are non-employer firms with no paid employees other than the owners of the business. These businesses, though small in size
- Celebrating 1 Year of CSF 2.0by Stephen Quinn (Cybersecurity Insights) on 26 February 2025 at 12:00
It has been one year since the release of the NIST Cybersecurity Framework (CSF) 2.0 ! To make improving your security posture even easier, in this blog we are: Sharing new CSF 2.0 resources; Taking a retrospective look at some resources and applications you may have missed; and Highlighting ways you can stay involved in our work, helping us help you implement better cybersecurity. NIST’s subject matter experts have worked over the last year to continue expanding the CSF 2.0 implementation resources to help you secure your enterprise. Stakeholders are a very important force behind NIST’s
- Tactical Wireless Security – Using DragonOS for Pentestingby CyberArms (CYBER ARMS – Computer Security) on 21 February 2025 at 18:42
This is a part of a sample chapter from my latest book, “Tactical Wireless Security” converted to article form. The book was originally created for a class to teach basic WiFi and SDR skills to Special Forces troops. The book is available now on Amazon. DragonOS Introduction DragonOS is a Linux-based system designed specifically for RF analysis … Continue reading "Tactical Wireless Security – Using DragonOS for Pentesting"
- Privacy-Preserving Federated Learning – Future Collaboration and Continued Researchby Gary Howarth, Sue Anie (Cybersecurity Insights) on 27 January 2025 at 12:00
This post is the final blog in a series on privacy-preserving federated learning . The series is a collaboration between NIST and the UK government’s Responsible Technology Adoption Unit (RTA), previously known as the Centre for Data Ethics and Innovation. Learn more and read all the posts published to date at NIST’s Privacy Engineering Collaboration Space or RTA’s blog . Reflections and Wider Considerations This is the final post in the series that began with reflections and learnings from the first US-UK collaboration working with Privacy Enhancing Technologies (PETs). Since the PETs Prize
- New Book – “Tactical Wireless Security”by CyberArms (CYBER ARMS – Computer Security) on 30 December 2024 at 18:17
My New SDR Wireless Security Testing Book -“Tactical Wireless Security” is Here! Unlock the Secrets of Testing Wireless Security and Master Software Defined Radio using Kali Linux and DragonOS with my latest release! In an increasingly interconnected world, securing the airwaves is no longer optional – it’s mission-critical. In this cutting-edge guide you will take … Continue reading "New Book – “Tactical Wireless Security”"
- NIST’s International Cybersecurity and Privacy Engagement Update – New Translationsby Amy Mahn (Cybersecurity Insights) on 19 December 2024 at 12:00
As the year comes to a close, NIST continues to engage with our international partners to strengthen cybersecurity, including sharing over ten new international translations in over six languages as resources for our stakeholders around the world. These efforts were complemented by discussions on opportunities for future enhanced international collaboration and resource sharing. Here are some updates from the past few months: Our international engagement continues through our support to the Department of State and the International Trade Administration (ITA) during numerous international
- Data Pipeline Challenges of Privacy-Preserving Federated Learningby Dr. Xiaowei Huang, Dr. Yi Dong, Sikha Pentyala (Cybersecurity Insights) on 5 December 2024 at 12:00
This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK government’s Responsible Technology Adoption Unit (RTA), previously known as the Centre for Data Ethics and Innovation. Learn more and read all the posts published to date at NIST’s Privacy Engineering Collaboration Space or RTA’s blog . Introduction In this post, we talk with Dr. Xiaowei Huang and Dr. Yi Dong (University of Liverpool) and Sikha Pentyala (University of Washington Tacoma), who were winners in the UK-US PETs Prize Challenges . We discuss real-world data
- Kicking-Off with a December 4th Workshop, NIST is Revisiting and Revising Foundational Cybersecurity Activities for IoT Device Manufacturers, NIST IR 8259!by Katerina Megas, Michael Fagan (Cybersecurity Insights) on 21 November 2024 at 12:00
In May 2020, NIST published Foundational Cybersecurity Activities for IoT Device Manufacturers (NIST IR 8259), which describes recommended cybersecurity activities that manufacturers should consider performing before their IoT devices are sold to customers. These foundational cybersecurity activities can help manufacturers lessen the cybersecurity-related efforts needed by customers, which in turn can reduce the prevalence and severity of IoT device compromises and the attacks performed using compromised devices. In the nearly five years since this document was released, it has been published