
The public sector is increasingly turning to IoT to enhance mission outcomes—from streamlining city traffic to improving classroom safety and enabling remote healthcare in rural areas. But with over 30%…
Learn More
The United States and EU should align their respective approaches to cybersecurity labeling for IoT products—the U.S. Cyber Trust Mark and the EU’s Cyber Resilience Act (CRA)—via technical standards and…
Learn More
The Federal Bureau of Investigation, Cyber National Mission Force, and National Security Agency assess that People’s Republic of China-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home…
Learn More
Executive Order 14306 reinforces America’s cybersecurity defenses amid escalating threats from foreign adversaries like China, Russia, and North Korea. It expands efforts around secure software development, quantum-resistant encryption, and AI-powered…
Learn More
Digital twin technology is expanding rapidly, bridging the physical and digital worlds to improve design, operations, and decision-making. By integrating AI, IoT, and analytics, organizations can simulate real-world assets to…
Learn More
State and local governments sit at the heart of critical infrastructure protection, facing rising cyber threats against systems that power water, energy, transportation, and healthcare. This overview emphasizes the need…
Learn More
This NIST publication explores how modern threat actors exploit increasingly interconnected systems—especially multicloud environments, IoT devices, and edge platforms. It highlights real-world attack patterns, showing how adversaries move laterally across…
Learn More
NIST outlines a methodology for understanding and documenting the network behavior of Internet of Things (IoT) devices. By capturing traffic across different life-cycle stages—setup, normal operation, and decommissioning—organizations can generate…
Learn More
NIST’s report documents the first Design-A-Thon, held at the 2024 SOUPS conference, which explored creative approaches for digital product cybersecurity education and awareness. Participants worked in teams to design strategies…
Learn More
As cyber threats grow in complexity, federal agencies are rethinking their security frameworks with a Zero Trust mindset—one that assumes no user, device, or network can be inherently trusted. This…
Learn More
NIST hosted a Design-A-Thon to explore creative ways to educate users about cybersecurity for digital products like IoT devices. Participants developed strategies ranging from storybook manuals and songs for children’s…
Learn More
The National Institute of Standards and Technology (NIST) has launched a Digital Twin Lab to accelerate innovation in U.S. manufacturing. This lab serves as a testbed for developing standards, prototyping…
Learn More
Digital records stored in Microsoft 365 face a silent threat — over time, file formats change, systems evolve, and crucial information risks becoming unreadable. Preserve365® bridges this gap, ensuring records…
Learn More
This guidance outlines foundational principles for safely integrating artificial intelligence into operational technology environments. It explains how AI can enhance efficiency and decision-making while also introducing new risks related to…
Learn More
The complexities of today’s IT landscape—think cloud apps, data silos, mobile, IoT, and Big Data—have exposed the limitations of role-based access control (RBAC) solutions, leaving organizations, federal government, and military…
Learn More