Trusted CI: The NSF Cybersecurity Center of Excellence
Blog
Mission Our Cybersecurity Program Success Stories Reports Code of Conduct Including Trusted CI in a Proposal Acknowledging Trusted CI
The Team Our Advisory Committee Our Ambassadors Our Partners Our Alumni Our Fellows Our Students RISC
Services Catalog Engagements
Resources Catalog Secure by Design Framework Employment Opportunities
Events Webinar Series 2025 NSF Cybersecurity Summit 2024 NSF Cybersecurity Summit
Contact Trusted CI Email Lists Help
About Mission Our Cybersecurity Program Success Stories Reports Code of Conduct Including Trusted CI in a Proposal Acknowledging Trusted CI Community The Team Our Advisory Committee Our Ambassadors Our Partners Our Alumni Our Fellows Our Students RISC Services Services Catalog Engagements Resources Resources Catalog Secure by Design Framework Employment Opportunities Events Events Webinar Series 2025 NSF Cybersecurity Summit 2024 NSF Cybersecurity Summit Blog Contact Contact Trusted CI Email Lists Help
Trusted CI: The NSF Cybersecurity Center of Excellence
May 2025: Conducting Responsible Human-Centered AI Research
Jeannette DopheideMay 19, 2025
March 2025: The Operational Technology Procurement Vendor Matrix
Jeannette DopheideMarch 31, 2025
February 2025: Trusted Volunteer Edge-Cloud Computing for Scientific Workflows
Jeannette DopheideFebruary 24, 2025
January 2025: A Unified Monitoring Approach to Enhancing the Security and Resiliency of Hazard Workflows
Jeannette DopheideJanuary 27, 2025
November 2024: Privacy Preserving Aggregate Range Queries on Encrypted Multi-dimensional Databases
Jeannette DopheideNovember 18, 2024
August 2024: JSON Web Tokens for Science: Hands on Jupyter Notebook Tutorial
Jeannette DopheideAugust 26, 2024
July 2024: Automated Building and Deploy Testing — Using Zeek as an example
Jeannette DopheideJuly 22, 2024
June 2024: The Transformative Twelve: Taking a Practical, Evidence-Based Approach to Cybersecurity Controls
Jeannette DopheideJune 21, 2024
May 2024: NSF's 2025 Research Infrastructure Guide: Information Assurance
Jeannette DopheideMay 20, 2024
April 2024: SPHERE - Security and Privacy Heterogeneous Environment for Reproducible Experimentation
Jeannette DopheideApril 9, 2024Comment
March 2024: Lessons from the ACCORD Project
Jeannette DopheideMarch 18, 2024
December 2023: Open Science Chain
Jeannette DopheideDecember 4, 2023
September 2023: Improving the Privacy and Security of Data for Wastewater-based Epidemiology
Jeannette DopheideSeptember 13, 2023
August 2023: Leveraging Adaptive Framework for Open Source Data Access Solutions
Jeannette DopheideAugust 28, 2023
July 2023: The Technical Landscape of Ransomware: Threat Models and Defense Models
Jeannette DopheideJuly 17, 2023
June 2023: SecureMyResearch at Indiana University: Effective Cybersecurity for Research
Jeannette DopheideJune 26, 2023
May 2023: Senior Citizens Striking Back at Scammers
Jeannette DopheideMay 22, 2023
April 2023: Cybersecurity Operations for the NSF ACCESS Cyberinfrastructure
Jeannette DopheideApril 24, 2023
March 2023: The Internet2 Routing Integrity Initiative
Jeannette DopheideMarch 27, 2023
February 2023: Using the Trusted CI Framework to Create the CFDE Cybersecurity Program
Jeannette DopheideFebruary 27, 2023
Older
nsf_small.png
Contact Us
 

Trusted CI, the NSF Cybersecurity Center of Excellence is supported by the National Science Foundation under Interagency Agreement #A2407-049-089-064206.0. The views expressed do not necessarily reflect the views of the National Science Foundation or any other organization.

This work is licensed under a Creative Commons Attribution-­NonCommercial 4.0 International (CC BY­-NC 4.0) license. ©2025