U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. News
  3. Publications Library
  4. Cybersecurity

Cybersecurity

Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.

  • Highlighting Our Progress in 2011

    Secretary Napolitano highlighted DHS' progress in 2011, emphasizing major steps taken to enhance America's capabilities to guard against terrorism.

  • Loaned Executive Program Assignment Announcement for Senior Advisor, Financial Services Integration, CS&C

    The U.S. Department of Homeland Security (DHS) seeks to bring in one or more Loaned Executive(s) to advise the Office of Cybersecurity & Communications (CS&C) on the development and advancement of integration between the National Cybersecurity and Communications Integration Center (NCCIC) and the “financial services operation center.”

  • Securing the Internet of Things

    Securing the Internet of Things

  • DHS Strategic Industry Conversation

    Strategic Industry Conversations (SIC) are events that enable program area topic discussions between DHS leaders and industry.

  • White Paper on Computer Network Security & Privacy Protection

    In 2010, DHS issued a White Paper on Computer Network Security & Privacy Protection to provide an overview of the Department's cybersecurity responsibilities, the role of the EINSTEIN system in implementing those responsibilities, and the integrated privacy protections.

  • Memorandum on Preparing for Post-Quantum Cryptography

    This memorandum provides guidance to Component Heads to begin preparing for a transition from current cryptography standards to post-quantum encryption now to mitigate risks to data and mission functions.

  • Post-Quantum Cryptography Frequently Asked Questions

    The Department of Homeland Security (DHS), in partnership with the Department of Commerce’s National Institute of Standards and Technology (NIST), has released a roadmap to help organizations protect their data and systems and to reduce risks  related to the advancement of quantum computing technology.

  • Preparing for Post-Quantum Cryptography: Infographic

    Through our partnership with NIST, DHS created a roadmap for those organizations who should be taking action now to prepare for a transition to post-quantum cryptography. This guide will help organizations create effective plans to ensure the continued security of their essential data against the post-quantum threat and prepare for the transition to the new post-quantum cryptography standard when published by NIST.

  • Key Findings and Recommendations: Foreign Interference Related to the 2020 US Federal Elections

    This product provides a declassified overview of findings and recommendations from a classified joint report from the Attorney General and Secretary of Homeland Security addressing the impact of activities by foreign governments and their agents targeting election infrastructure or infrastructure pertaining to political organizations, candidates, or campaigns used in the 2020 US federal elections on the security or integrity of such infrastructure. Pursuant to Executive Order (EO) 13848, the joint report relied on the Intelligence Community Assessment (ICA) addressing foreign threats to the 2020 US elections.

  • Data Security Business Advisory

    This Advisory describes the data-related risks American businesses face as a result of the actions of the People’s Republic of China (PRC) and outlines steps that businesses can take to mitigate these risks. Businesses expose themselves and their customers to heightened risk when they share sensitive data with firms located in the PRC, or use equipment and software developed by firms with an ownership nexus in the PRC, as well as with firms that have PRC citizens in key leadership and security-focused roles (together, “PRC firms”). Due to PRC legal regimes and known PRC data collection practices, this is particularly true for data service providers and data infrastructure.