Below are links to Cloud Services, 5G, Internet for All, Climate Risks, and Grant Information that have articles, videos and PDF documents that will help you navigate your way through those issues.
NTIA Initiatives
This resource guides organizations to use all available security disciplines (e.g., acquisition, personnel, logistics, facilities) to enhance their supply chain security and remove opportunities for exploitation.
In this practice guide, the National Cybersecurity Center of Excellence (NCCoE) applies standards, best 270 practices, and commercially available technology to demonstrate various mechanisms for trusted 271 network-layer onboarding of IoT devices. This guide shows how to provide network credentials to IoT 272 devices in a trusted manner and maintain a secure device posture throughout the device lifecycle.
This resource discusses the value of SBOM-driven transparency for SaaS and offers recommendations for advancing transparency in SaaS software
Maturing your cyber threat hunting capability requires resource planning and a fully integrated supply chain risk management program. This resource provides an overview of the Cyber Threat Hunting Maturity Model (HMM) which helps to identify the level of security controls in an organization.
This guidance outlines significant foreign adversarial supply chain attack methods utilized by the People's Republic of China (PRC), critical lessons learned, and suggests mitigations that corporate security stakeholders can tailor for their own risk management strategy.
The CSF can help an organization become a smart acquirer and supplier of technology products and services to improve your organizations' Cybersecurity Supply Chain Risk Management (C-SCRM).
In this report, you will find a concise explanation of cloud security and risk management.
This lecture provides an overview of cloud computing, including concepts and best practices for cloud architecture, design, security, and operation.
To ensure the safety of your business and your customers' information, the FTC has provided six helpful tips for businesses to follow when using cloud services.
This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities.