NSA Cyber (@nsacyber) 's Twitter Profile
NSA Cyber

@nsacyber

We protect our nation’s most sensitive systems against cyber threats. Likes, retweets, and follows ≠ endorsement.

ID: 1199111577833820160

linkhttps://www.nsa.gov/Cybersecurity/ calendar_today25-11-2019 23:44:36

469 Tweet

144,144K Takipçi

17 Takip Edilen

NSA Cyber (@nsacyber) 's Twitter Profile Photo

"I feel proud to be part of the mission of the agency," Gloria R. Now more than ever, cybersecurity is a team sport – and our ability to collaborate with government, industry, and academia gives us the edge we need to counter adversarial threats. Interested in joining our team

NSA Cyber (@nsacyber) 's Twitter Profile Photo

Cybersecurity is national security, and that requires a national approach. NSA has locations and opportunities to contribute to an important mission all over the country, including in Alaska, Colorado, Georgia, Hawaii, Texas, and Utah. Interested in joining our team? Check out

NSA Cyber (@nsacyber) 's Twitter Profile Photo

Working with our partners is what we do best. Help us Secure Our World not just during National Cybersecurity Month, but all year long.

NSA Cyber (@nsacyber) 's Twitter Profile Photo

Unlock the best practices for securing your enterprise computing systems with Trusted Platform Modules (TPMs). Check out our latest Cybersecurity Information Sheet for essential guidance and recommended uses. #Cybersecurity #TPM #DataSecurity nsa.gov/Press-Room/Pre…

NSA Cyber (@nsacyber) 's Twitter Profile Photo

Check out our joint list of the top 15 routinely exploited vulnerabilities in 2023. More zero day exploitation than past years. Our latest advisory lists important mitigation procedures for vendors, developers, and end-user organizations. nsa.gov/Press-Room/Pre…

Check out our joint list of the top 15 routinely exploited vulnerabilities in 2023. More zero day exploitation than past years. Our latest advisory lists important mitigation procedures for vendors, developers, and end-user organizations. nsa.gov/Press-Room/Pre…
CISA Cyber (@cisacyber) 's Twitter Profile Photo

CISA completed a #RedTeam Assessment with a #CriticalInfrastructure partner, simulating real-world cyber threats. The result? 👀 The red team was able to compromise the org’s domain due to insufficient controls. Read more for lessons learned & insights 👉 bit.ly/40ZIX7y

CISA completed a #RedTeam Assessment with a #CriticalInfrastructure partner, simulating real-world cyber threats. The result? 👀 The red team was able to compromise the org’s domain due to insufficient controls. Read more for lessons learned & insights 👉 bit.ly/40ZIX7y
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Defend your enterprise network against a current threat. Follow our joint guidance to bolster network visibility, harden devices, and strengthen your defenses against a PRC-affiliated actor who has targeted global telecommunications providers. nsa.gov/Press-Room/Pre…

Defend your enterprise network against a current threat. Follow our joint guidance to bolster network visibility, harden devices, and strengthen your defenses against a PRC-affiliated actor who has targeted global telecommunications providers. nsa.gov/Press-Room/Pre…
NSA Cyber (@nsacyber) 's Twitter Profile Photo

NSA understands the importance of Defense Industrial Base companies when it comes to national security. That's why we offer no-cost cybersecurity services to companies with an active DoD contract. Go to nsa.gov/CCC and select "Get Started" to join us in securing the

NSA Cyber (@nsacyber) 's Twitter Profile Photo

Don’t let threat actors exploit weaknesses in operational technology. When buying OT products, know the key security elements to consider and the right questions to ask manufacturers. nsa.gov/Press-Room/Pre…

Don’t let threat actors exploit weaknesses in operational technology. When buying OT products, know the key security elements to consider and the right questions to ask manufacturers. nsa.gov/Press-Room/Pre…
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Read the latest FAQ on quantum-resistance for your systems. We’re releasing another update to the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) and Quantum Computing FAQ, including NIST standards updates and clarifications based on customer feedback. Read now:

Read the latest FAQ on quantum-resistance for your systems. We’re releasing another update to the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) and Quantum Computing FAQ, including NIST standards updates and clarifications based on customer feedback. Read now:
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Too often, software in our most critical systems is developed and used without truly understanding or trusting that it works properly across all conditions. We must close this gap. Read our joint report, “Closing the Software Understanding Gap,” to learn more.

Too often, software in our most critical systems is developed and used without truly understanding or trusting that it works properly across all conditions. We must close this gap. Read our joint report, “Closing the Software Understanding Gap,” to learn more.
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Failing to secure edge devices is like leaving a door open for malicious actors. Prevent exploitation of critical network components by following the mitigation strategies for edge devices in the reports published today by NSA and others. nsa.gov/Press-Room/Pre…

Failing to secure edge devices is like leaving a door open for malicious actors. Prevent exploitation of critical network components by following the mitigation strategies for edge devices in the reports published today by NSA and others. nsa.gov/Press-Room/Pre…
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Malicious cyber actors can conceal their activities and evade detection using fast flux, a technique that changes the IP address associated with a domain name. Follow our new guidance for strategies to detect and mitigate this national security threat. media.defense.gov/2025/Apr/02/20…

Malicious cyber actors can conceal their activities and evade detection using fast flux, a technique that changes the IP address associated with a domain name. Follow our new guidance for strategies to detect and mitigate this national security threat. media.defense.gov/2025/Apr/02/20…
NSA Cyber (@nsacyber) 's Twitter Profile Photo

The growing convergence of IT and OT systems has introduced new threats to OT environments. Our new report outlines improvements to security policies and requirements to improve the security of smart controllers embedded in OT National Security Systems. nsa.gov/Press-Room/Pre…

The growing convergence of IT and OT systems has introduced new threats to OT environments. Our new report outlines improvements to security policies and requirements to improve the security of smart controllers embedded in OT National Security Systems. nsa.gov/Press-Room/Pre…
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Data security is essential for achieving secure and trustworthy AI/ML systems. Help ensure the accuracy and integrity of your AI outcomes and protect sensitive data by adopting the best practices and mitigations outlined in our new joint guidance. media.defense.gov/2025/May/22/20…

Data security is essential for achieving secure and trustworthy AI/ML systems. Help ensure the accuracy and integrity of your AI outcomes and protect sensitive data by adopting the best practices and mitigations outlined in our new joint guidance. media.defense.gov/2025/May/22/20…
NSA Cyber (@nsacyber) 's Twitter Profile Photo

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Memory safety is one of many important aspects that contribute to holistic security. Software producers should utilize our new guidance to plan for and begin adoption of Memory Safe Languages today to reduce the risk of security incidents. 🔗: media.defense.gov/2025/Jun/23/20…

Memory safety is one of many important aspects that contribute to holistic security. Software producers should utilize our new guidance to plan for and begin adoption of Memory Safe Languages today to reduce the risk of security incidents.

🔗: media.defense.gov/2025/Jun/23/20…
CISA Cyber (@cisacyber) 's Twitter Profile Photo

We urge orgs to monitor for potential cyber threats against U.S. #CriticalInfrastructure —routine targets for Iranian govt-affiliated actors. See our joint fact sheet for more info & mitigations. 👉 go.dhs.gov/wjJ

We urge orgs to monitor for potential cyber threats against U.S. #CriticalInfrastructure —routine targets for Iranian govt-affiliated actors. See our joint fact sheet for more info & mitigations. 👉 go.dhs.gov/wjJ
NSA Cyber (@nsacyber) 's Twitter Profile Photo

If you haven't already, we strongly encourage organizations utilizing AI to review our recent guidance and adopt the best practices and mitigation strategies to secure their AI-enabled systems and protect their sensitive data. media.defense.gov/2025/May/22/20…

If you haven't already, we strongly encourage organizations utilizing AI to review our recent guidance and adopt the best practices and mitigation strategies to secure their AI-enabled systems and protect their sensitive data.

media.defense.gov/2025/May/22/20…