Capabilities & Resources
Explore our suite of tools and resources advancing cybersecurity.
- Autonomous Cyber Operations
- Cloud Security
- Cross Domain Solutions
- Cryptography and Trust
- Cyber Adversary Emulation
- Cyber Analytics
- Cyber Assessments
- Cyber Deception and Adversary Engagement
- Cyber Forensics
- Cyber Resiliency
- Cyber Safety
- Cyber Strategy and Governance
- Cyber Supply Chain Security
- Cyber Threat Intelligence
- Defensive Cyber Operations
- Enterprise Security Architecture
- Identity, Credential, and Access Management
- IoT Systems Security
- Offensive Non-Kinetics
- Privacy
- Security Automation and Management
- Software Assurance
Our Dedicated Innovation Centers
Cyber Infrastructure Protection Innovation Center
Develops technologies, practices, and approaches to protect critical infrastructure from malicious cyber or non-kinetic attack or disruption.
Cyber Operations and Effects Innovation Center
Provides solutions and expertise performing defensive cyber operations, enabling offensive objectives, and conducting adversary emulation.
Cyber Solutions Innovation Center
Conducts high-impact research and investigations to advance innovative and effective cyber solutions.
Develops technologies, practices, and approaches to protect critical infrastructure from malicious cyber or non-kinetic attack or disruption.
Provides solutions and expertise performing defensive cyber operations, enabling offensive objectives, and conducting adversary emulation.
Conducts high-impact research and investigations to advance innovative and effective cyber solutions.
Resources
Health Cyber Ransomware Resource Center
A resource focused on defeating the increasing number of attacks aimed at the healthcare sector.
Insider Threat Research and Solutions
Data-driven frameworks, indicators, methodologies, mitigations, operational successes, and thought leadership to reduce the risk from harmful acts undertaken by trusted employees inside an organization.
MITRE ATLAS
A globally accessible, living knowledge base of adversary tactics and techniques based on real-world attack observations and realistic demonstrations from AI red teams and security groups.
MITRE ATT&CK
A globally accessible knowledge base of adversary behaviors based on real-world observations.
OVAL
Open Vulnerability and Assessment Language is a community-developed language for determining vulnerability and configuration issues on computer systems.
Playbook for Threat Modeling Medical Devices
The playbook provides insights on how an organization can develop or evolve an approach to creating threat models in a systematic and consistent way.
Post-Quantum Cryptography Coalition
This community of technologists, researchers, and expert practitioners drives broader understanding and public adoption of post-quantum cryptography and the associated NIST standards.
SAF
The Security Automation Framework supports security processes at all stages of the software lifecycle, from planning secure system design to analyzing operational security data.
STIX
Structured Threat information eXpression is a collaborative, community-driven effort to define and develop a structured language to represent cyber threat information.
System of Trust
A framework that provides a comprehensive, community driven knowledge base of supply chain security risks and a customizable risk assessment process.
Pagination
- Next page
- Page 2