NSA's 12th annual Codebreaker Challenge is open for registration! Students will complete seven tasks that showcase the technical problems and analysis performed daily NSA. If you're ready to put your skills to the test, learn more and register for the challenge: nsa-codebreaker.org
National Security Agency
Defense and Space Manufacturing
Ft. Meade, MD 518,831 followers
Where Intelligence Goes to Work. https://www.nsa.gov
About us
NSA is at the forefront of U.S. government cryptology, integrating signals intelligence (SIGINT) and cybersecurity to enhance national and allied advantages. Our mission encompasses computer network operations aimed at securing critical insights and services, ensuring decisive advantages for the nation and our allies. NSA's cybersecurity initiatives are pivotal in safeguarding U.S. national security systems, particularly within the Defense Industrial Base and enhancing the security of U.S. weaponry. We are committed to advancing cybersecurity through education, research, and career development. Through foreign signals intelligence (SIGINT), NSA delivers crucial intelligence to U.S. policymakers and military forces. This intelligence, derived from electronic signals and systems used by foreign entities, provides essential insights into the capabilities, actions, and intentions of adversaries worldwide. It supports our efforts to defend the nation, save lives, and advance U.S. objectives and alliances globally.
- Website
-
https://www.nsa.gov
External link for National Security Agency
- Industry
- Defense and Space Manufacturing
- Company size
- 10,001+ employees
- Headquarters
- Ft. Meade, MD
- Type
- Government Agency
- Founded
- 1952
- Specialties
- Computer/Electrical Engineering, Computer Science, Cybersecurity, Mathematics, Data Science, Foreign Language Analysis, Business, Accounting and Budget, Intelligence Analysis, Information Assurance, Cryptanalysis, Signals Analysis, Security & Counterintelligence, STEM, Intelligence Collection, Infrastructure & Logistics, Human Resources, Inspection, Investigation & Compliance, Communication & Public Affairs, Education & Training, and Paid Internships, Scholarships and Co-op
Locations
-
Primary
9800 Savage Rd
Ft. Meade, MD 20755, US
Employees at National Security Agency
-
Clemente Garcia
Trusted™Enterprise Cyber Security, Agile Coach, Generative AI, Data Privacy-EU GDPR/US CCPA, SEC/FTC Edgar System, Patent Agent, Portfolio Program…
-
Vince Rountree, NBC-HWC, MBA, ChE
National Board Certified Health & Wellness Coach, Specializing in Weight loss, Lowering Blood Pressure, Lowering Cholesterol & Lowering Blood Glucose
-
Barry Hester
-
Shawn Ames
Considering NYC City Council Run: Designing an AI NYC #MAGA Takes NYC - AI PM & SME, Sheepdogs Defense AI, ex-Microsoft, ex-NY State - FE Solutions…
Updates
-
As concerns about the security and provenance of software grow, it’s crucial to understand the risks in software components and the software’s supply chain. The first step to addressing these risks and securing the software ecosystem is to increase software component and supply chain transparency. Software Bill of Materials (SBOM) is a key tool for increasing visibility across an organization’s software supply chain and enterprise system by documenting information about software dependencies. Learn more about the advantages of integrating SBOM into security processes and practices by reviewing our recently released joint guidance, “A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity.” https://lnkd.in/e6VDWhrt
-
-
We recently published a Cybersecurity Advisory (CSA) with Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation (FBI), and others worldwide to call out Chinese state-sponsored advanced persistent threat (APT) actors targeting major global telecommunications providers and other critical infrastructure, and provide appropriate mitigation guidance. Network defenders should continue to hunt for malicious activity and apply the mitigations outlined in the advisory to reduce the threat of Chinese-state sponsored APT actors. https://lnkd.in/dmwF8Ncx
-
-
Today, we #AimHigh by celebrating the United States Air Force 78th birthday! Established in 1947, the Air Force has been our guardian of air, space and cyberspace. Salute to all Airmen for their service!
-
-
NSA is joining Cybersecurity and Infrastructure Security Agency and others to release the Cybersecurity Information Sheet (CSI), “A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity,” to inform producers, choosers, and operators of software of the advantages of integrating SBOM generation, analysis, and sharing into security processes and practices. Software developers and procurement organizations, especially those within and for National Security Systems, the Department of Defense, and the Defense Industrial Base, should review our guidance to better understand the advantages of integrating SBOM generation, analysis, and sharing into existing security processes and practices. https://lnkd.in/e6VDWhrt
-
-
While workers across the U.S. enjoy their #LaborDay off, the American people can rest knowing NSA’s mission never sleeps. Thank you to the hardworking members of the NSA/CSS workforce for their incredible work and dedication to support our military and safeguard our Nation – 24/7.
-
-
Creating an asset inventory allows organizations to use the information it provides to build and deploy appropriate security controls, enhance system reliability, and invest in more defensible architecture elements. Net defenders aiming to create an operational technology (OT) asset inventory and taxonomy to increase their security posture should review the recently released guidance, “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators,” which provides clear and digestible steps and best practices for defenders and decision makers. https://lnkd.in/d43tqR6q
-
-
We’ve joined Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation (FBI), and others to release the new Cybersecurity Advisory (CSA), “Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System,” to provide an overview of hunting and mitigation guidance and associated best practices related to recent Chinese cyber threat activity. Network defenders are encouraged to review the recent advisory to reduce the threat of Chinese state-sponsored actors and protect their networks. https://lnkd.in/dmwF8Ncx
-
-
Yesterday, Mr. Joseph Francescon was appointed to serve as NSA’s 21st Deputy Director and senior civilian leader. Under his leadership, NSA will continue to carry out our vital foreign signals intelligence and cybersecurity mission in support of national priorities of The White House, the United States Department of Defense, and the Office of the Director of National Intelligence. https://lnkd.in/eZr92feq