NSA Cyber
@NSACyber
We protect our nation’s most sensitive systems against cyber threats. Likes, retweets, and follows ≠ endorsement.
ID:1199111577833820160
https://www.nsa.gov/Cybersecurity/ 25-11-2019 23:44:36
431 Tweets
133,6K Followers
17 Following
Gray skies got you down? This World #CloudSecurity Day, remember you’re not alone – you have our Top Ten Cloud Security Mitigation Strategies to help you secure your systems! Check out the series now: nsa.gov/Press-Room/Pre…
On cloud 9 with the ninth release from our series, Top Ten Cloud Security Management, in collaboration with CISA Cyber. Read our guidance “Mitigate Risks from Managed Service Providers in Cloud Environments” now: media.defense.gov/2024/Mar/07/20…
DevSecOps procedures are critical to security. Learn if you are up to date on best practices by reading Top Ten Cloud Security Management Strategy 6: Defending Continuous Integration/Continuous Delivery Environments. media.defense.gov/2023/Jun/28/20…
CISA Cyber
Is your leadership asking about PRC threats to your systems? Along with CISA Cyber and other partners, we’re releasing an executive overview of the February 2024 joint cybersecurity advisory on PRC actor Volt Typhoon activity. Read now: media.defense.gov/2024/Mar/19/20…
Do you have a backup and recovery plan for your data in the cloud? Learn from the best practices we’ve outlined w/ co-author CISA Cyber in “Secure Data in the Cloud,” the fifth release from our Top Ten Cloud Security Management Strategies series. Read now: media.defense.gov/2024/Mar/07/20…
Zero Trust practices can help protect your cloud data. With CISA Cyber, we’ve published “Implement Network Segmentation and Encryption in Cloud Environments” as the fourth installment in our Top Ten Cloud Security Management Strategies series. Read more: media.defense.gov/2024/Mar/07/20…
Cloud keys are a critical part of cloud security. Along with CISA Cyber, we’ve released the guidance “Use Secure Cloud Key Management Practices,” as number three in our Top Ten Cloud Security Management Strategies series. Read on: media.defense.gov/2024/Mar/07/20…
Are you vulnerable to phishing or credential attacks on cloud access? Learn more from the second installment in our Top Ten Cloud Security Mitigation Strategies: Use Secure Cloud Identity and Access Management Practices media.defense.gov/2024/Mar/07/20…
CISA Cyber