U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. News
  3. Publications Library
  4. Cybersecurity

Cybersecurity

Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.

  • DHS Space Policy

    Within the homeland security enterprise, space-based systems play a critical role in securing the homeland as DHS components and partners rely heavily on space systems to provide information and communications necessary for mission success. The DHS Space Policy guides component efforts internally and across the homeland security enterprise.

  • Cryptographic Agility Infographic

    The Cryptographic Agility Infographic illustrates a design feature that enables updates to future cryptographic algorithms and standards without the need to modify or replace the surrounding infrastructure.

  • Law Enforcement Resources

    DHS is fundamentally a department of partnerships. We are committed to ensuring you have the tools, resources, and support you need to continue doing so successfully. This guide highlights many of the resources available to law enforcement partners, including training and grant opportunities, to increase nationwide resilience to evolving threats.

  • DHS Cybersecurity Service Overview for Potential Applicants

    Information about the DHS Cybersecurity Service.

  • Memorandum on Preparing for Post-Quantum Cryptography

    This memorandum provides guidance to Component Heads to begin preparing for a transition from current cryptography standards to post-quantum encryption now to mitigate risks to data and mission functions.

  • Post-Quantum Cryptography Frequently Asked Questions

    The Department of Homeland Security (DHS), in partnership with the Department of Commerce’s National Institute of Standards and Technology (NIST), has released a roadmap to help organizations protect their data and systems and to reduce risks  related to the advancement of quantum computing technology.

  • Preparing for Post-Quantum Cryptography: Infographic

    Through our partnership with NIST, DHS created a roadmap for those organizations who should be taking action now to prepare for a transition to post-quantum cryptography. This guide will help organizations create effective plans to ensure the continued security of their essential data against the post-quantum threat and prepare for the transition to the new post-quantum cryptography standard when published by NIST.

  • Key Findings and Recommendations: Foreign Interference Related to the 2020 US Federal Elections

    This product provides a declassified overview of findings and recommendations from a classified joint report from the Attorney General and Secretary of Homeland Security addressing the impact of activities by foreign governments and their agents targeting election infrastructure or infrastructure pertaining to political organizations, candidates, or campaigns used in the 2020 US federal elections on the security or integrity of such infrastructure. Pursuant to Executive Order (EO) 13848, the joint report relied on the Intelligence Community Assessment (ICA) addressing foreign threats to the 2020 US elections.

  • Vulnerability Disclosure Program Policy and Rules of Engagement

    In accordance with Section 101 and Title I of the SECURE Technology Act (P.L. 115-390), this policy provides security researchers with clear guidelines for (1) conducting vulnerability and attack vector discovery activities directed at Department of Homeland Security (DHS) systems and (2) submitting those discovered vulnerabilities. This policy has been developed in consultation with the Attorney General, the Secretary of Defense, the Administrator of GSA, and non-governmental security researchers.

  • Data Security Business Advisory

    This Advisory describes the data-related risks American businesses face as a result of the actions of the People’s Republic of China (PRC) and outlines steps that businesses can take to mitigate these risks. Businesses expose themselves and their customers to heightened risk when they share sensitive data with firms located in the PRC, or use equipment and software developed by firms with an ownership nexus in the PRC, as well as with firms that have PRC citizens in key leadership and security-focused roles (together, “PRC firms”). Due to PRC legal regimes and known PRC data collection practices, this is particularly true for data service providers and data infrastructure.