An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
Vol. 20 No 1 2013

TNW 20-1 | 2013 | 20th Anniversary Issue

Vol. 19 No 2 2012

TNW 19-2 | 2012 | Developing a Blueprint for a Science of Cybersecurity

Vol. 18 No 4 2011

TNW 18-4 | 2011 | The Art of Forecasting & Futures Planning

Vol. 18 No 3 2010

TNW 18-3 | 2010 | Mapping Out Faster, Safer Networks

Vol. 18 No 2 2009

TNW 18-2 | 2009 | Taking the Open Source Road

Vol. 18 No 1 2009

TNW 18-1 | 2009 | Center for Advanced Study of Language

Vol. 17 No 4 2009

TNW 17-4 | 2009 | An Overview of Cloud Computing

Vol. 17 No 3 2008

TNW 17-3 | 2008 | The Myth of Revolutionary Technologies

Vol. 17 No 2 2008

TNW 17-2 | 2008 | An Information Visualization Primer & Field Trip

Vol. 22 No.2 2019

TNW 22-2 | 2019 | Machine Learning 2

Cybersecurity Advisory (CSA) titled "Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities" details 25 vulnerabilities that Chinese state-sponsored malicious cyber actors are currently exploiting or targeting.

Cybersecurity Advisory: Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities (October 2020)

CEDI Fact Sheet

CEDI Fact Sheet

IAPP COVID PRIVACY AND SCHOOL RECORDINGS BLOG 20200917

IAPP COVID PRIVACY AND SCHOOL RECORDINGS BLOG 20200917

Test

CTR-UEFI-SECURE-BOOT-CUSTOMIZATION-UOO168873-20.PDF

National Security Agency Cybersecurity Information on the topic of Performing Out-of-Band Network Management. Out-of-Band (OoB) network management is a concept that uses an alternate communication path to manage network
infrastructure devices.

Performing Out-of-Band Network Management

National Security Agency Cybersecurity Information on the topic of Compromised Personal Network Indicators and Mitigations. Cybersecurity is a crucial priority for these users to ensure their data and networks remain secure and uncompromised. This includes being able to identify indicators of a network compromise and pursue potential mitigations. This knowledge aids users in safeguarding their personal networks and data.

Compromised Personal Network Indicators and Mitigations

History Today Anthologies: On The Roof Gang

On The Roof Gang: Who's Harry Kidder

History Today Anthologies: On The Roof Gang

On The Roof Gang: USS Gold Star

History Today Anthologies: On The Roof Gang

On The Roof Gang: Stewart Faulkner Article Part 2

History Today Anthologies: On The Roof Gang

On The Roof Gang: Stewart Faulkner Article Part 1

  • FIRST
  • 91
  • 92
  • 93 (current)
  • 94
  • 95
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
    • Scams & Safety
    • Reasonable Accommodations Process
    • Personal Assistance Services
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1