NSA Cyber Profile Banner
NSA Cyber Profile
NSA Cyber

@NSACyber

Followers
134,025
Following
17
Media
206
Statuses
433

We protect our nation’s most sensitive systems against cyber threats. Likes, retweets, and follows ≠ endorsement.

Joined November 2019
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@NSACyber
NSA Cyber
3 years
Malicious cyber actors are using two sets of #TTPs to access protected data in the #cloud . Detect and mitigate against this activity by reviewing our latest #cybersecurity advisory:
Tweet media one
60
838
2K
@NSACyber
NSA Cyber
3 years
Russian Foreign Intelligence Service (SVR) cyber actors are exploiting five publicly known vulnerabilities to target U.S. and allied critical networks. Review our joint #cybersecurity guidance with @CISAgov and @FBI and apply the mitigations to stop them:
Tweet media one
96
1K
2K
@NSACyber
NSA Cyber
4 years
The Russian GRU 85th GTsSS, sometimes publicly known as #APT28 or #FancyBear , is using a previously undisclosed #Linux malware called Drovorub for cyber espionage operations. For full details and mitigations, review our #cybersecurity advisory with @FBI :
Tweet media one
70
1K
2K
@NSACyber
NSA Cyber
3 years
If malicious cyber actors gain initial access to networks through the #SolarWinds compromise, the TTPs noted in our advisory may be used to forge credentials and maintain persistent access. Our guidance helps detect and mitigate against this, no matter the initial access method.
@NSACyber
NSA Cyber
3 years
Malicious cyber actors are using two sets of #TTPs to access protected data in the #cloud . Detect and mitigate against this activity by reviewing our latest #cybersecurity advisory:
Tweet media one
60
838
2K
36
391
863
@NSACyber
NSA Cyber
3 years
Today our #Ghidra team pushed a preview debugger on @GitHub . #Developers and testers, check out this long awaited feature:
41
317
966
@NSACyber
NSA Cyber
3 years
NSA urges applying critical Microsoft patches released today, as exploitation of these #vulnerabilities could allow persistent access and control of enterprise networks.
31
741
1K
@NSACyber
NSA Cyber
2 years
Great news! A new version of D3FEND is now available at . D3FEND enables other cyber professionals to tailor defenses against specific cyber threats and reduce a system's potential attack surface. Learn more about D3FEND here:
18
404
1K
@NSACyber
NSA Cyber
4 years
Welcome to the intersection of threat intel, vulnerability analysis, and technical expertise! All to better equip you against malicious #cyber activity.
86
173
732
@NSACyber
NSA Cyber
3 years
NSA and @CISAgov share Kubernetes configurations and recommendations to harden environments against compromise. Understanding the options for building and maintaining a secure Kubernetes cluster is key to protecting your data & resources.
Tweet media one
24
398
909
@NSACyber
NSA Cyber
4 years
Russian Intelligence Services #APT29 is using WellMess, WellMail, and SoreFang #malware to target COVID-19 research and more. IOCs and mitigations provided in our joint #cybersecurity advisory with @NCSC , @CSE_cst , and @CISAgov
Tweet media one
53
495
647
@NSACyber
NSA Cyber
3 years
Russian state-sponsored cyber actors are exploiting #vulnerability CVE-2020-4006 affecting VMware Workspace ONE Access. We recommend patching immediately. Read our latest #cybersecurity advisory for details, including detection and mitigation actions:
21
466
747
@NSACyber
NSA Cyber
3 years
We collaborated with @CISAgov & @FBI on our #cybersecurity advisory, detailing Chinese state-sponsored actor #TTPs used against U.S. and allied networks. For a thorough understanding of this cyberthreat, read our overview, observed TTPs & mitigations.
Tweet media one
40
429
767
@NSACyber
NSA Cyber
3 years
#Ghidra 9.2.1 has been released! Visit to download a copy.
41
265
668
@NSACyber
NSA Cyber
3 years
D3FEND, a MITRE research project funded by the NSA, improves the #cybersecurity of NSS, DoD, and the DIB by providing defensive countermeasures for common offensive techniques. Learn more here:
16
389
721
@NSACyber
NSA Cyber
3 years
Zero Trust assumes all users, devices, and network components to be untrusted until verified as legitimate. For more on how #ZeroTrust can enhance your organization’s security, review our latest #cybersecurity release:
129
336
673
@NSACyber
NSA Cyber
3 years
FireEye’s blog addressing unauthorized access to their Red Team’s tools and techniques—which include leveraging well known CVEs—underscores the need to #patch . Protect your systems, review FireEye’s GitHub repository to #detect and counter these threats:
6
319
659
@NSACyber
NSA Cyber
4 years
Sandworm Team, Russian GRU Main Center for Special Technologies actors, continue to exploit Exim mail transfer agent #vulnerability , CVE-2019-10149. Patch to the latest version to protect your networks. Learn more here:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
16
417
612
@NSACyber
NSA Cyber
3 years
#Ghidra 10.0 has been let loose! We are pleased to include the first version of the new integrated Ghidra debugger. Head over to to check out all the changes and launch the debugger on your reverse engineering project.
17
224
658
@NSACyber
NSA Cyber
7 months
ELITEWOLF is on the hunt! NSA released a repository of signatures and analytics to secure Operational Technology. Check it out on GitHub:
Tweet media one
30
207
625
@NSACyber
NSA Cyber
3 years
Our recent #cybersecurity advisory with @CISAgov @FBI & @NCSC publicly exposes a global brute force campaign. Exploitation is likely ongoing. Review our advisory for #IOCs and #mitigation techniques:
Tweet media one
22
333
555
@NSACyber
NSA Cyber
4 years
Our UEFI Secure Boot Customization #cybersecurity report explains how system admins can customize Secure Boot to better protect against firmware threats, including the recent #BootHole vulnerability CVE-2020-10713. Read the detailed recommendations here:
Tweet media one
Tweet media two
9
272
533
@NSACyber
NSA Cyber
1 year
Russian FSB cyber actors are deploying cyberespionage malware targeting over 50 countries. Take action to keep FSB’s Snake malware out of your networks. Learn how to detect and mitigate associated malicious activities.
Tweet media one
81
242
525
@NSACyber
NSA Cyber
4 years
A proof of concept exploit has been released for Windows Netlogon vulnerability CVE-2020-1472. We expect it to be used. Install the patch and implement additional instructions in Microsoft article KB4557222.
@CISACyber
CISA Cyber
4 years
Remember to patch CVE-2020-1472—an elevation of privilege vulnerability in Microsoft’s Netlogon. Read more at . #Cyber #Cybersecurity #InfoSec
2
119
114
11
334
512
@NSACyber
NSA Cyber
1 year
Are you teleworking? Just use your laptop to watch your favorite shows? Malicious actors have ramped up their attacks on home networks. Make your network an unattractive target by following NSA’s best practices for securing your home network:
Tweet media one
29
204
443
@NSACyber
NSA Cyber
7 months
Don’t let cyber actors sneak into your network. NSA and joint authors have released a cybersecurity advisory so you can identify and defend against PRC-linked cyber actor BlackTech.
Tweet media one
21
215
436
@NSACyber
NSA Cyber
1 year
#Ghidra 10.2 has been released at ! Check out the latest version for a myriad of Decompiler, Debugger and other enhancements including union support, debugger scripting, and even a little Machine Learning for function detection.
11
146
408
@NSACyber
NSA Cyber
11 months
DPRK cyber actors continue impersonating legitimate journalists, academics, and think tank employees in coordinated spearphishing campaigns. Read our joint advisory to learn about their tactics and our mitigations to protect against these attacks.
Tweet media one
54
191
374
@NSACyber
NSA Cyber
3 years
Our latest #cybersecurity update reminds users to take precautions when using #wireless devices in public to keep their #devices and #data #secure . Check it out:
Tweet media one
34
204
367
@NSACyber
NSA Cyber
3 years
Today’s #cybersecurity release recommends how enterprises can adopt the encrypted DNS protocol DoH without sacrificing security control. Network owners and admins must understand the benefits/risks before adopting. Read more:
16
201
354
@NSACyber
NSA Cyber
2 years
Cisco device admins should use password protection Type 8 whenever possible to keep their passwords secure. For details on the types available and issues with using weak encryption, read our best practices guide
Tweet media one
21
145
332
@NSACyber
NSA Cyber
2 years
Iranian cyber actors are exploiting known vulnerabilities to access U.S. critical infrastructure networks and conduct follow-on operations. Read our latest joint report with our partners to detect and mitigate this threat:
29
150
327
@NSACyber
NSA Cyber
4 years
Cyber actors are exploiting Internet-accessible operational technology assets to conduct malicious #cyber activity against critical infrastructure. Follow our joint recommendations with @CISAgov to protect your systems.
18
169
273
@NSACyber
NSA Cyber
4 years
CVE-2020-10713 poses significant risk to Linux and Windows systems. Follow the mitigations in our #Cybersecurity Advisory to protect against this GRUB2 #BootHole vulnerability.
Tweet media one
12
183
276
@NSACyber
NSA Cyber
4 years
#Mobile devices store and share device #geolocation data by design. To limit risk of your location data being exposed, follow the guidance in our newest #cybersecurity information sheet
23
174
261
@NSACyber
NSA Cyber
3 years
This incident should be treated as serious and stakeholders should take immediate action. For indicators of compromise and how to #detect the #sunburst malware, visit the @FireEye blog:
@WHNSC45
NSC 45 Archived
3 years
“The NSC is working closely with @CISAgov , @FBI , the intelligence community, and affected departments and agencies to coordinate a swift and effective whole-of-government recovery and response to the recent compromise.” – NSC spokesman John Ullyot
21
84
234
23
118
256
@NSACyber
NSA Cyber
3 years
#BlackMatter #ransomware -as-a-service has been targeting U.S. critical infrastructure since July 2021. We partnered with @CISAgov and @FBI to share the advisory with actor TTPs and mitigations.
Tweet media one
11
179
311
@NSACyber
NSA Cyber
4 years
Obsolete #VPN encryption can put data at risk. Review our updated #IPsec VPN configuration guidance with five key tasks to follow and signatures to help keep your data protected.
Tweet media one
14
119
268
@NSACyber
NSA Cyber
3 years
Russian SVR continues leveraging publicly known vulnerabilities—including recently released CVEs—for its cyber activities. Read our joint @NCSC , @CISAgov , and @FBI advisory on how to detect and mitigate this and other techniques the SVR has been using.
Tweet media one
11
174
301
@NSACyber
NSA Cyber
2 years
As #CyberMonth comes to a close, don't forget the work doesn't stop here! Join our team and play a role in helping others #BeCyberSmart
21
85
297
@NSACyber
NSA Cyber
2 years
Network infrastructure security is critical. Administrators can leverage our technical report to help prioritize next steps in their work to strengthen networks against adversary targeting attempts.
Tweet media one
9
147
295
@NSACyber
NSA Cyber
3 years
Protect against the #Conti #ransomware threat using the #cybersecurity guidance from @CISAgov , @FBI and NSA. Understand Conti group TTPs and take immediate action:
Tweet media one
19
156
295
@NSACyber
NSA Cyber
3 years
Today’s guidance with @CISAgov outlines how to properly select the right remote access VPN for your organization and how to further harden your VPN once in use.
Tweet media one
24
140
288
@NSACyber
NSA Cyber
2 years
Properly configuring and monitoring PowerShell can yield many benefits, including the ability to detect and prevent abuse by malicious cyber actors. Read our latest report with @CISAgov , @NCSC , and NCSC-New Zealand to find out how.
Tweet media one
47
127
271
@NSACyber
NSA Cyber
3 years
Protective Domain Name System (PDNS) leverages threat feeds to identify and block connections to known malicious domains. Our recent joint report with @CISAgov details the benefits of PDNS, capabilities to consider, and effective implementation. Read more:
Tweet media one
19
111
277
@NSACyber
NSA Cyber
3 months
People’s Republic of China-sponsored actors are targeting U.S. critical infrastructure, pre-positioning for disruptive actions. We’ve joined with @CISACyber , @FBI , and others to address this activity. Read our advisory now:
Tweet media one
49
128
280
@NSACyber
NSA Cyber
2 years
APT actors are targeting certain ICS/SCADA devices and could gain full system access if undetected. We urge organizations to apply the detection and mitigation recommendations in our joint advisory to thwart this activity.
Tweet media one
29
161
262
@NSACyber
NSA Cyber
2 years
Take steps now to protect against the Russia cyber threat: Invest in logs and monitoring so you can hunt out malicious activity & minimize impacts if compromise occurs. Strengthen your networks by taking actions in our joint advisory with @CISAgov & @FBI .
Tweet media one
12
136
266
@NSACyber
NSA Cyber
2 years
Over the last several years, Russian state-sponsored cyber actors have been targeting U.S. cleared defense contractors. Apply the mitigations in our joint cybersecurity guidance with @FBI & @CISAgov to reduce the risk of compromise by these threat actors.
Tweet media one
31
152
251
@NSACyber
NSA Cyber
11 months
Don’t let a malicious actor take advantage of you. Learn how to hunt and mitigate a PRC state-sponsored cyber actor who may be using your systems’ resources to hide their activities.
Tweet media one
24
155
265
@NSACyber
NSA Cyber
2 years
Ransomware incidents targeting critical infrastructure were on the rise in 2021. Protect against the threat using the joint cybersecurity guidance from @FBI , @CISAGov , @CyberGovAu , and @NCSC to help reduce the risk of compromise. Read more here:
Tweet media one
27
135
257
@NSACyber
NSA Cyber
2 years
PRC sponsored cyber actors have exploited telecommunications and other network service providers to expand targeting worldwide. Our latest report with @CISAgov and @FBI outlines continued general trends and specific TTPs used in this targeting.
Tweet media one
34
143
252
@NSACyber
NSA Cyber
2 months
Fancy Bear doesn’t hibernate – they’ve been abusing popular routers since 2022. To counter this Russian state-sponsor activity, we’ve joined @FBI , @CNMF_CyberAlert , and international co-sealers to release actionable guidance. Read our report:
Tweet media one
25
160
260
@NSACyber
NSA Cyber
4 years
Chinese state-sponsored malicious cyber actors are exploiting publicly known #vulnerabilities . Network defenders should take action to protect against this activity. For a full list of CVEs & related mitigations review our latest #cybersecurity advisory:
Tweet media one
14
172
246
@NSACyber
NSA Cyber
2 years
Log4j vulnerabilities continue to be exploited–keep watch for updates from vendors. Read the advisory with @CISAgov , @FBI , @CyberGovAU , @NCSC , @CERTNZ & @cybercentre_ca for a summary of the threats and mitigations to defend your IT and OT assets.
Tweet media one
36
129
250
@NSACyber
NSA Cyber
2 years
The top #CVEs exploited in 2021 were mostly newly disclosed. This joint advisory highlights the need for timely updates and a patch management program to protect networks.
Tweet media one
25
109
242
@NSACyber
NSA Cyber
5 months
AI systems are subject to unique security vulnerabilities that need to be considered alongside standard cyber threats. Learn how to secure AI systems from design to operation in our release with @CISAgov , @NCSC , and other partners:
47
106
250
@NSACyber
NSA Cyber
10 months
Since the earliest days of computers, NSA has been focused on ensuring security for all. The Rainbow Series was the start of cybersecurity as we know it today. Read the original guidance here:
Tweet media one
25
76
253
@NSACyber
NSA Cyber
2 years
Malicious actors regularly exploit poor security and misconfigurations to gain access to networks. The latest joint release captures what you can do to keep networks safe from these commonly exploited controls and practices.
Tweet media one
38
133
240
@NSACyber
NSA Cyber
4 months
Our 2023 Year in Review is out now – read it to learn about our work on AI, strategic competition, and more, all possible because of our strong partnerships:
Tweet media one
30
109
250
@NSACyber
NSA Cyber
2 years
APT actors are targeting Defense Industrial Base enterprise networks, using Impacket to further compromise a network after gaining access. Apply the detection & mitigation recommendations in our joint advisory with @CISAgov & @FBI to thwart this activity.
Tweet media one
11
125
235
@NSACyber
NSA Cyber
2 years
Thousands of cybersecurity students and network defenders have used #Ghidra to build and research current technologies since its release — head over to to check it out.
@NSAGov
NSA/CSS
5 years
We join Rob Joyce in announcing that #Ghidra is alive! Download your copy: and start reversing! #RSAC #RSAC2019
Tweet media one
53
267
481
40
68
223
@NSACyber
NSA Cyber
2 years
We expect to see an increase in targeting of managed service providers. This joint advisory with @NCSC , @CISAgov , @FBI , @CyberGovAU , and @cybercentre_ca highlights key actions for MSPs and their customers to secure communications and other sensitive data.
Tweet media one
42
128
211
@NSACyber
NSA Cyber
8 months
The quantum computing era is fast approaching and qubits are coming. Learn how to prepare and protect against malicious use of quantum computers.
Tweet media one
139
138
220
@NSACyber
NSA Cyber
3 years
Microsoft has released a powershell script for deploying critical #mitigations related to the Microsoft Exchange Vulnerabilities. If network defenders can't patch in a timely fashion, use the released script to shrink the attack surface. View the script:
10
141
225
@NSACyber
NSA Cyber
3 years
Today, we released our Potential Threat Vectors to 5G Infrastructure analysis paper with our partners @ODNIgov , @CISAgov & industry to enhance understanding of risks introduced by #5G . Learn more here:
18
122
219
@NSACyber
NSA Cyber
7 months
Cybersecurity Awareness Month is almost here! We are looking forward to another great year of partnership with @DHSgov and @CISAgov to kick off #CyberMonth and promote best practices in cyber! #BeCyberSmart
50
98
227
@NSACyber
NSA Cyber
1 year
Adversaries are seeking to influence the design and manufacturing of DoD microelectronics critical to national security. NSA released two technical reports today to help DoD protect field programmable gate array (FPGA) systems from adversary influence.
Tweet media one
22
100
214
@NSACyber
NSA Cyber
16 days
The future is here: AI systems are widely available and accessible. But with new systems come new risks. Along with partners, we’re releasing a new set of best practices to help your org stay secure. Read “Deploying AI Systems Securely” now:
Tweet media one
21
90
224
@NSACyber
NSA Cyber
8 months
Don’t get fooled by deepfakes. Learn about synthetic media threats, techniques, and trends, and how to protect against them.
Tweet media one
35
109
216
@NSACyber
NSA Cyber
4 years
CVE-2020-1350 represents significant risk to Windows DNS servers. #Patch or apply the mitigation steps today, you should expect adversaries are hard at work writing exploits for this #vulnerability . Check out our detailed guidance:
Tweet media one
14
131
196
@NSACyber
NSA Cyber
11 months
Don’t let malicious actors use your remote access as backdoors into your system. Learn how to detect and mitigate this type of targeting:
Tweet media one
22
75
195
@NSACyber
NSA Cyber
22 days
Data security is a critical part of Zero Trust architecture. We’re releasing guidance and recommendations to help you secure your data at rest and in transit. Read now and stay secure:
Tweet media one
32
98
206
@NSACyber
NSA Cyber
7 months
We love a good cyber puzzle. Skill level: Beginner.
Tweet media one
99
38
195
@NSACyber
NSA Cyber
3 years
Want to mitigate lateral movement of adversaries in your 5G cloud environment? Read the Enduring Security Framework’s guidance published by @NSAGov and @CISAgov to learn a layered approach to building a more secure system:
Tweet media one
15
89
190
@NSACyber
NSA Cyber
5 months
Take action. Russian SVR cyber actors are targeting technology companies worldwide by taking advantage of known vulnerabilities in JetBrains TeamCity servers. Learn how to detect and mitigate associated activities.
Tweet media one
31
90
198
@NSACyber
NSA Cyber
5 months
Russia-based cyber actor Star Blizzard is active and persistent. Protect yourself from the spear-phishing attacks they and others use by following guidelines outlined by us, @NCSC , and our partners:
Tweet media one
43
104
191
@NSACyber
NSA Cyber
3 years
Our latest #cybersecurity product helps sys admins #detect and replace outdated TLS encryption protocol implementations with updated configurations to ensure data is being effectively protected. Read more:
13
97
180
@NSACyber
NSA Cyber
2 months
Don’t let adversaries darken your skies – secure your cloud environments now. To aid organizations in defending their cloud resources, we’re releasing our Top Ten Cloud Security Mitigation Strategies. Learn more about what you can do:
Tweet media one
16
84
192
@NSACyber
NSA Cyber
7 months
Multi-factor authentication (MFA) and single sign-on (SSO) technologies are vulnerable. Along with @CISAgov and industry partners, we’ve released a new report identifying key challenges and actionable recommendations to better secure MFA and SSO. Read now:
Tweet media one
14
86
189
@NSACyber
NSA Cyber
4 months
We’re on top of AI. We know that our adversaries are actively exploiting AI and looking for ways to do harm. NSA CCC chief Morgan Adamski explains how we’re combatting the threat. Watch her message, then read our 2023 Cybersecurity Year in Review:
55
70
184
@NSACyber
NSA Cyber
3 years
#Ghidra 10.0 has been let loose! We are pleased to include the first version of the new integrated Ghidra debugger. Head over to to check out all the changes and launch the debugger on your reverse engineering project.
7
66
181
@NSACyber
NSA Cyber
2 years
Updates to our #Kubernetes Hardening Guide with @CISAgov are live! Thanks to all who reached out with feedback to help make the guidance more comprehensive — including more detailed info on logging and threat detection in addition to other clarifications.
22
103
181
@NSACyber
NSA Cyber
3 years
In October 2019, @NSAGov established a directorate dedicated to preventing and eradicting cyber threats in support of our #cybersecurity mission. Our #YearInReview outlines key milestones and mission outcomes achieved.
32
83
159
@NSACyber
NSA Cyber
3 years
#OperationalTechnology owners and operators will benefit from our recent #Cybersecurity Advisory on how to evaluate risks to their systems & make informed decisions to prevent and detect malicious activities. Review the pragmatic evaluation methodology:
Tweet media one
7
94
179
@NSACyber
NSA Cyber
3 months
Round two! NSA has partnered again with @CISACyber , @FBI , and other U.S. and international agencies to provide guidance and harden targets against living off the land techniques employed by People’s Republic of China and Russian state-sponsored actors.
Tweet media one
67
74
178
@NSACyber
NSA Cyber
3 years
#CodebreakerTechTip : Having proficiency with an advanced text editor can make it easier to examine large or complex text files. Two popular editors: emacs and vi. Our preference? No comment.
20
39
173
@NSACyber
NSA Cyber
3 years
Our guidance is still applicable for network defenders hunting webshells this weekend.
@NSACyber
NSA Cyber
3 years
As seen in recently patched Microsoft Exchange vulnerability exploits, malicious cyber actors continue using web shells for data exfil and other actions on victim networks. Protect against this by #patching & applying mitigations in our web shell guidance:
Tweet media one
9
49
107
21
87
175
@NSACyber
NSA Cyber
2 years
Minimize the risk of malicious PDFs affecting your environments. Our latest technical report includes updated #configuration recommendations for #Adobe Acrobat Reader—including for the newer cloud features.
Tweet media one
18
84
168
@NSACyber
NSA Cyber
1 month
Is your leadership asking about PRC threats to your systems? Along with @CISACyber and other partners, we’re releasing an executive overview of the February 2024 joint cybersecurity advisory on PRC actor Volt Typhoon activity. Read now:
Tweet media one
10
84
175
@NSACyber
NSA Cyber
11 months
Ransomware tactics and techniques are rapidly evolving. Learn what you can do to #StopRansomware .
Tweet media one
21
91
165
@NSACyber
NSA Cyber
4 months
We chase and eradicate threats all across the globe. @CYBERCOM_DIRNSA and @NSA_CSDirector sat down to talk about the state of cybersecurity and how NSA defends the nation 24/7. Watch their conversation, then read our Year in Review report:
67
81
168
@NSACyber
NSA Cyber
6 months
NSA has released a technical report with our evaluation of commercially available embedded field programmable gate arrays (eFPGA). If you’re protecting sensitive information, read more now:
Tweet media one
52
91
170
@NSACyber
NSA Cyber
8 days
Make sure your systems are quantum-resistant! We're releasing updates to the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) FAQ, including information on hash-based signatures, hybrid classical/pq solutions, NIST updates, and more. Read now:
Tweet media one
23
97
176
@NSACyber
NSA Cyber
26 days
Dave Luber has started as @NSAGov 's new Director of Cybersecurity @NSA_CSDirector . He now leads our critical mission to prevent and eradicate threats to National Security Systems and the Defense Industrial Base. Welcome, Dave! Learn more about him here:
Tweet media one
28
53
168
@NSACyber
NSA Cyber
1 year
NSA just released our 2022 Cybersecurity Year in Review. Find out how our work to defend the nation impacts you, and stay tuned as we highlight 5 ways NSA is securing at scale:
Tweet media one
11
77
155
@NSACyber
NSA Cyber
2 years
It takes collaboration to secure Operational Technology. Morgan Adamski, Director of @NSAGov 's #Cybersecurity Collaboration Center, spoke with @DragosInc , @ENERGY , and @CISAgov about threats to these systems and how #Partnerships play a key role in securing them.
Tweet media one
11
49
158
@NSACyber
NSA Cyber
2 years
Malicious cyber actors have a game plan for compromising OT/ICS assets. Our joint Cybersecurity Advisory with @CISAgov dissects their tactics and shows how to defend against them:
Tweet media one
27
72
152