NSA/CSS (@nsagov) 's Twitter Profile
NSA/CSS

@nsagov

National Security Agency/Central Security Service official account, home to America's codemakers and codebreakers. Likes, retweets, and follows ≠ endorsement.

ID: 2248872301

linkhttps://www.nsa.gov/ calendar_today16-12-2013 14:48:10

3,3K Tweet

1,1M Followers

162 Following

NSA/CSS (@nsagov) 's Twitter Profile Photo

In honor of #NationalThesaurusDay 1/18, for each #NoSuchPuzzle, we provide a sentence with two words removed. The two words are heterographs (same pronunciation but different spelling) for two synonyms (same meaning). We provide the lengths of the two words. Find the two words.

In honor of #NationalThesaurusDay 1/18, for each #NoSuchPuzzle, we provide a sentence with two words removed. The two words are heterographs (same pronunciation but different spelling) for two synonyms (same meaning). We provide the lengths of the two words. Find the two words.
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Don’t let threat actors exploit weaknesses in operational technology. When buying OT products, know the key security elements to consider and the right questions to ask manufacturers. nsa.gov/Press-Room/Pre…

Don’t let threat actors exploit weaknesses in operational technology. When buying OT products, know the key security elements to consider and the right questions to ask manufacturers. nsa.gov/Press-Room/Pre…
NSA/CSS (@nsagov) 's Twitter Profile Photo

National Mentorship Month is a great time to celebrate how mentorship drives careers at NSA. Learn how it’s impacted our team. bit.ly/4fnU4uo #mentorship #mentorshipmonth

National Mentorship Month is a great time to celebrate how mentorship drives careers at NSA. Learn how it’s impacted our team. bit.ly/4fnU4uo #mentorship #mentorshipmonth
NSA Cyber (@nsacyber) 's Twitter Profile Photo

Too often, software in our most critical systems is developed and used without truly understanding or trusting that it works properly across all conditions. We must close this gap. Read our joint report, “Closing the Software Understanding Gap,” to learn more.

Too often, software in our most critical systems is developed and used without truly understanding or trusting that it works properly across all conditions. We must close this gap. Read our joint report, “Closing the Software Understanding Gap,” to learn more.
NSA/CSS (@nsagov) 's Twitter Profile Photo

In honor of #NationalThesaurusDay 1/18, for each #NoSuchPuzzle, we provide a sentence with two words removed. The two words are heterographs (same pronunciation but different spelling) for two synonyms (same meaning). We provide the lengths of the two words. Find the two words.

In honor of #NationalThesaurusDay 1/18, for each #NoSuchPuzzle, we provide a sentence with two words removed. The two words are heterographs (same pronunciation but different spelling) for two synonyms (same meaning). We provide the lengths of the two words. Find the two words.
National Cryptologic Museum (@natcryptomuseum) 's Twitter Profile Photo

Thank you for your continued support of the National Cryptologic Museum. We are dedicated to presenting the public with historically accurate exhibits and we have corrected a mistake that covered an exhibit. We look forward to visitors exploring the museum and its rich history.

NSA Cyber (@nsacyber) 's Twitter Profile Photo

Failing to secure edge devices is like leaving a door open for malicious actors. Prevent exploitation of critical network components by following the mitigation strategies for edge devices in the reports published today by NSA and others. nsa.gov/Press-Room/Pre…

Failing to secure edge devices is like leaving a door open for malicious actors. Prevent exploitation of critical network components by following the mitigation strategies for edge devices in the reports published today by NSA and others. nsa.gov/Press-Room/Pre…
NSA/CSS (@nsagov) 's Twitter Profile Photo

Discover how NSA invests in its people through the National Cryptologic University. Watch the video to see how we’re building the future of expertise.

NSA/CSS (@nsagov) 's Twitter Profile Photo

Don’t miss an opportunity to learn from technical and language analysis experts at NSA over multiple semesters. Apply now for the Co-Op Program! bit.ly/2RitZ6H

Don’t miss an opportunity to learn from technical and language analysis experts at NSA over multiple semesters. Apply now for the Co-Op Program! bit.ly/2RitZ6H
NSA/CSS (@nsagov) 's Twitter Profile Photo

#ICYMI, Ghidra 11.3 has new features to supercharge work on your cybersecurity challenges. We added the long-requested built-in Python3 support based on Pyhidra, a p-code accelerated emulator, and original source code to binary linking. Check it out: github.com/NationalSecuri…

#ICYMI, Ghidra 11.3 has new features to supercharge work on your cybersecurity challenges. We added the long-requested built-in Python3 support based on Pyhidra, a p-code accelerated emulator, and original source code to binary linking. Check it out: github.com/NationalSecuri…
NSA/CSS (@nsagov) 's Twitter Profile Photo

NSA is aware of posts that appear to show inappropriate discussions by IC personnel. IC collaboration platforms are intended to drive mission outcomes. Potential misuse of these platforms by a small group of individuals does not represent the community. Investigations to address

NSA/CSS (@nsagov) 's Twitter Profile Photo

In accordance with Department of Defense Instruction 5400.17 and recent Executive Orders issued by the President, NSA is reviewing and adjusting its social media content to ensure compliance with DoD policies and priorities.

In accordance with Department of Defense Instruction 5400.17 and recent Executive Orders issued by the President, NSA is reviewing and adjusting its social media content to ensure compliance with DoD policies and priorities.
NSA/CSS (@nsagov) 's Twitter Profile Photo

Honored to host DNI Tulsi Gabbard for a tour of NSA/CSS Hawaii, where our talented workforce collaborates with partners across the Indo-Pacific region to deliver critical cybersecurity and foreign signals intelligence in defense of our Nation.

NSA Cyber (@nsacyber) 's Twitter Profile Photo

Malicious cyber actors can conceal their activities and evade detection using fast flux, a technique that changes the IP address associated with a domain name. Follow our new guidance for strategies to detect and mitigate this national security threat. media.defense.gov/2025/Apr/02/20…

Malicious cyber actors can conceal their activities and evade detection using fast flux, a technique that changes the IP address associated with a domain name. Follow our new guidance for strategies to detect and mitigate this national security threat. media.defense.gov/2025/Apr/02/20…
NSA/CSS (@nsagov) 's Twitter Profile Photo

Congratulations to Georgia Tech for winning NSA’s 2024 Codebreaker Challenge! Thank you to all the schools and students who participated. Learn more about the challenge that helps prepare our nation’s future cyber warriors: nsa.gov/Press-Room/Pre…

Congratulations to <a href="/GeorgiaTech/">Georgia Tech</a> for winning NSA’s 2024 Codebreaker Challenge! Thank you to all the schools and students who participated. Learn more about the challenge that helps prepare our nation’s future cyber warriors: nsa.gov/Press-Room/Pre…
NSA Cyber (@nsacyber) 's Twitter Profile Photo

The growing convergence of IT and OT systems has introduced new threats to OT environments. Our new report outlines improvements to security policies and requirements to improve the security of smart controllers embedded in OT National Security Systems. nsa.gov/Press-Room/Pre…

The growing convergence of IT and OT systems has introduced new threats to OT environments. Our new report outlines improvements to security policies and requirements to improve the security of smart controllers embedded in OT National Security Systems. nsa.gov/Press-Room/Pre…
NSA/CSS (@nsagov) 's Twitter Profile Photo

From General Washington’s spies during the Revolutionary War, to our very first director, LT GEN Ralph Canine, and well into the future, Army intelligence has been a cornerstone of the nation’s lethality. Happy 250th birthday to U.S. Army. This We’ll Defend. #Army250

From General Washington’s spies during the Revolutionary War, to our very first director, LT GEN Ralph Canine, and well into the future, Army intelligence has been a cornerstone of the nation’s lethality.
Happy 250th birthday to <a href="/USArmy/">U.S. Army</a>. This We’ll Defend. #Army250
NSA Cyber (@nsacyber) 's Twitter Profile Photo

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…