Trusted CI: The NSF Cybersecurity Center of Excellence
Blog
Mission Our Cybersecurity Program Success Stories Reports Code of Conduct Including Trusted CI in a Proposal Acknowledging Trusted CI
The Team Our Advisory Committee Our Ambassadors Our Partners Our Alumni Our Fellows Our Students RISC
Services Catalog Engagements
Resources Catalog Secure by Design Framework Employment Opportunities
Events Webinar Series 2025 NSF Cybersecurity Summit 2024 NSF Cybersecurity Summit
Contact Trusted CI Email Lists Help
About Mission Our Cybersecurity Program Success Stories Reports Code of Conduct Including Trusted CI in a Proposal Acknowledging Trusted CI Community The Team Our Advisory Committee Our Ambassadors Our Partners Our Alumni Our Fellows Our Students RISC Services Services Catalog Engagements Resources Resources Catalog Secure by Design Framework Employment Opportunities Events Events Webinar Series 2025 NSF Cybersecurity Summit 2024 NSF Cybersecurity Summit Blog Contact Contact Trusted CI Email Lists Help
Trusted CI: The NSF Cybersecurity Center of Excellence
Aug 2016: The Science DMZ as a Security Architecture
Jeannette DopheideApril 16, 2021
Sep 2016: The Risk of the Commons
Jeannette DopheideApril 16, 2021
Oct 2016: Science or Security?
Jeannette DopheideApril 16, 2021
Dec 2016: CICI Regional Cybersecurity Collaboration projects
Jeannette DopheideApril 16, 2021
Jan 2017: Open Science Cyber Risk Profile
Jeannette DopheideApril 16, 2021
Feb 2017: Practical Cybersecurity Program for (Smaller) Science Programs
Jeannette DopheideApril 16, 2021
Mar 2017: SDN and IAM Integration at Duke
Jeannette DopheideApril 16, 2021
Apr 2017: HIPAA and FISMA: Computing with Regulated Data
Jeannette DopheideApril 16, 2021
May 2017: Cybersecurity Research: Transition To Practice (TTP)
Jeannette DopheideApril 16, 2021
Jun 2017: Using the Blockchain to Secure Provenance Meta-Data
Jeannette DopheideApril 16, 2021
Jul 2017: Inaugural Security Program at Internet2
Jeannette DopheideApril 16, 2021
Aug 2017: Stronger Security for Password Authentication
Jeannette DopheideApril 16, 2021
Aug 2017: An overview of CTSC Engagements and the Application Process
Jeannette DopheideApril 16, 2021
Sep 2017: Demystifying Threat Intelligence
Jeannette DopheideApril 16, 2021
Oct 2017: Incident Response in an Open and Decentralized Network
Jeannette DopheideApril 16, 2021
Dec 2017: The State of the Cybersecurity Center of Excellence
Jeannette DopheideApril 16, 2021
Feb 2018: SmartProvenance: A Distributed, Blockchain Based Data Provenance
Jeannette DopheideApril 14, 2021
Mar 2018: Data quality and security evaluation framework development
Jeannette DopheideApril 14, 2021
Apr 2018: Toward Security-Managed Virtual Science Networks
Jeannette DopheideApril 14, 2021
May 2018: The EU General Data Protection Regulation (GDPR)
Jeannette DopheideApril 14, 2021
Newer Older
nsf_small.png
Contact Us
 

Trusted CI, the NSF Cybersecurity Center of Excellence is supported by the National Science Foundation under Interagency Agreement #A2407-049-089-064206.0. The views expressed do not necessarily reflect the views of the National Science Foundation or any other organization.

This work is licensed under a Creative Commons Attribution-­NonCommercial 4.0 International (CC BY­-NC 4.0) license. ©2025