Common Weakness Enumeration (CWE) is a list of software weaknesses.| cwe.mitre.org
Website with the collection of all the cheat sheets of the project.| cheatsheetseries.owasp.org
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.How to use the KEV CatalogThe KEV catalog is also available in these formats:| Cybersecurity and Infrastructure Security Agency CISA
This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Binding Operational Directive 22-01 - Reducing the| Cybersecurity and Infrastructure Security Agency CISA
Short URL: https://www.nist.gov/pqcrypto For a plain-language introduction to post-quantum cryptography, go to: What Is Post-Quantum Cryptography? The initial public draft of NIST SP 800-227, Recommendations for Key-Encapsulation Mechanisms, is now...| csrc.nist.gov
As America’s cyber defense agency, CISA is charged with defending our nation against ever-evolving cyber threats and to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every hour of every day. But, as we introduce more unsafe technology to our lives, this has become increasingly difficult. | Cybersecurity and Infrastructure Security Agency CISA
NIST has finalized SP 800-218A, Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile. This publication augments SP 800-218 by adding practices, tasks, recommendations, considerations, notes,...| csrc.nist.gov
Let’s Encrypt issues certificates through an automated API based on the ACME protocol. In order to interact with the Let’s Encrypt API and get a certificate, a piece of software called an “ACME client” is required. No part of the process for getting a certificate happens on this website, which is merely informational. The first question to answer for people who want to get started with Let’s Encrypt is: will my hosting provider get and manage certificates from Let’s Encrypt for me...| letsencrypt.org