
National Institute of Standards and Technology
From nanoscale devices that power the most advanced microchips to earthquake-resistant skyscrapers, NIST’s measurements and research fuel innovation and improve the quality of life for all Americans.
Cybersecurity Framework | NIST
The Profile is structured around the NIST CSF 2.0 Functions: Govern, Identify, Protect, Detect, Respond, and Recover. These Functions form the basis for prioritizing cybersecurity outcomes …
NIST Chemistry WebBook
NIST site provides chemical and physical property data for over 40,000 compounds.
NVD - CVE-2025-13223
Nov 17, 2025 · NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be …
NIST will continue to build and host additional resources to help organizations implement the CSF, including Quick Start Guides and Community Profiles. All resources are made publicly available on …
Welcome to the NIST WebBook
The National Institute of Standards and Technology (NIST) uses its best efforts to deliver a high quality copy of the Database and to verify that the data contained therein have been selected on the basis of …
NIST Computer Security Resource Center | CSRC
The Computer Security Resource Center (CSRC) has information on many of NIST's cybersecurity- and information security-related projects, publications, news and events.
NIST Special Publication (SP) 800-61 Rev. 3, Incident Response ...
Apr 3, 2025 · This publication seeks to assist organizations with incorporating cybersecurity incident response recommendations and considerations throughout their cybersecurity risk management …
What We Do | NIST
Apr 19, 2016 · NIST provides guidance, training, information, and assistance so that companies, government agencies, standards bodies, and others can successfully work together on essential …
NIST Releases First 3 Finalized Post-Quantum Encryption Standards
Aug 13, 2024 · NIST has released a final set of encryption tools designed to withstand the attack of a quantum computer. These post-quantum encryption standards secure a wide range of electronic …