1,000+ Opportunities
Find the right grant
Search federal, foundation, and corporate grants with AI — or browse by agency, topic, and state.
This listing may be outdated. Verify details at the official source before applying.
Find similar grantsCybersecurity and Authentication is sponsored by National Science Foundation. Innovations for security and integrity of data processing, authentication, including secure cloud/HPC, distributed ledger, encryption, network security, matching compliance-first data storage and distributed systems.
Get alerted about grants like this
Save a search for “National Science Foundation” or related topics and get emailed when new opportunities appear.
Search similar grants →Extracted from the official opportunity page/RFP to help you evaluate fit faster.
Cybersecurity and Authentication – Apply Today | NSF SBIR Check recent critical alerts! (Last updated 12/22/2025) NSF has temporarily paused the submission of new Project Pitches to the SBIR/STTR programs due to the lapse in congressional authorization. Program Directors will continue to process Project Pitches that were previously received.
Please direct any questions to sbir@nsf. gov .
Cybersecurity and Authentication (CA) Development of OrganoBait synthetic bait, the NSF-Supported projected from Kepley BioSystems to provide an ocean-restorative alternative bait product Cybersecurity and Authentication (CA) The Cybersecurity and Authentication topic focuses on innovations related to the security and integrity of data and data processing and the authentication of people and devices.
These subtopic areas are meant to serve as examples; all proposals with technical innovation and significant commercial potential are welcome, regardless of the specific area of focus of the project. CA1. Computation on Encrypted Data CA2.
Cryptography, including Post-quantum Cryptography CA3. Data Privacy and Integrity CA4. Device Authentication CA6.
Encryption, including Homomorphic Encryption CA7. Network and Device Security CA8. Personal Authentication CA9.
Secure and Trusted Computing CA10. Secure Machine-to-Machine Communication CA11. Security of Cloud and High Performance Computing (HPC) Platforms CA12.
Other Cybersecurity and Authentication Technologies Application process for Cybersecurity and Authentication (CA) funding Eligibility for Cybersecurity and Authentication (CA) funding + Your company must be a small business (fewer than 500 employees) located in the United States. At least 50% of your company’s equity must be owned by U.S. citizens or permanent residents.
NSF does not fund companies that are majority-owned by multiple venture capital firms, private equity firms, or hedge funds, to participate in SBIR and STTR. All funded work, including work done by consultants and contractors, needs to take place in the United States. The project’s principal investigator (tech lead) must be legally employed at least 20 hours a week by the company seeking funding.
The principal investigator doesn’t need any advanced degrees. The principal investigator needs to commit to at least one month (173 hours) of work on a funded project per six months of project duration. Evaluation Criteria: What We Look for When Evaluating Cybersecurity and Authentication (CA) proposals + Take our project assessment to see if your work might be a good fit for NSF funding.
Monitoring internal and external network performance - ThousandEyes Mohit Lad, CEO & Co-Founder of ThousandEyes “The grants we received from NSF were instrumental in bootstrapping ThousandEyes and allowing us to focus on building the first version of our product and acquiring customers.
By the time we raised our series A from Sequoia capital, we had a handful of well-known brands as customers with annual bookings of more than $250k, i.e. real revenue. Thanks to NSF, we were on our way to commercializing our technology. ” -Mohit Lad, CEO & Co-Founder of ThousandEyes, a network intelligence platform for businesses, was founded by Lad and Ricardo Oliviera in 2010.
In 2018, they have 220 employees and have raised nearly $110 million. ThousandEyes delivers Network Intelligence—performance visibility and actionable insights on digital experience for every user and application over any network.
It arms network engineers, operations teams, support/service desk staff, developers, and even business users with an accurate, up-to-the-moment understanding of the link between application delivery and underlying network dependencies and behaviors– both inside and outside the organization.
ThousandEyes' patented Path Visualization provides detailed hop-by-hop visibility and performance metrics from any network, even if it's outside your enterprise boundaries. A global inference engine correlates multiple streams of data and visually pinpoints the location of outages (shown as red circles), and provides additional contextual information about the specific location.
PQSecure Technologies, LLC We invest up to $2 million in seed funding and take zero equity. We’re looking for companies that are transformative, high-risk, have a market pull, and are scaleable.
Scoring criteria used to review proposals for this grant.
Based on current listing details, eligibility includes: U. S. -based small businesses (<500 employees); principal investigator primarily employed by the company. Applicants should confirm final requirements in the official notice before submission.
Current published award information indicates $275,000 (Phase I) Always verify allowable costs, matching requirements, and funding caps directly in the sponsor documentation.
The current target date is rolling deadlines or periodic funding windows. Build your timeline backwards from this date to cover registrations, approvals, attachments, and final submission checks.
Federal grant success rates typically range from 10-30%, varying by agency and program. Build a strong proposal with clear objectives, measurable outcomes, and a well-justified budget to improve your chances.
Requirements vary by sponsor, but typically include a project narrative, budget justification, organizational capability statement, and key personnel CVs. Check the official notice for the complete list of required attachments.
Yes — AI tools like Granted can help research funders, draft proposal sections, and check compliance. However, always review and customize AI-generated content to reflect your organization's unique strengths and the specific requirements of the solicitation.
Review timelines vary by funder. Federal agencies typically take 3-6 months from submission to award notification. Foundation grants may be faster, often 1-3 months. Check the program's timeline in the official solicitation for specific dates.
Many federal programs offer multi-year funding or allow competitive renewals. Check the official solicitation for continuation and renewal policies. Non-competing continuation applications are common for multi-year awards.
America's Seed Fund (SBIR/STTR) - Robotics (R) Topic is sponsored by National Science Foundation (NSF). This NSF SBIR/STTR topic focuses on robot intelligence and experiential learning, specifically in high-performance processors or hardware that provide situational awareness and improved artificial intelligence. It encourages innovations in voice, obstacle and image recognition, emotional response, and hand-eye coordination. Proposals that borrow features from animal nervous systems and include biologists, neuroscientists, and psychologists are also encouraged. The program also seeks proposals for next-generation automation, flexible assembly lines for mass customization, advanced control with agile robotic systems, and applications supporting individuals with disabilities, healthcare, smart drones, and personal robots.
Impact Challenge: AI for Government Innovation is sponsored by Google.org. This challenge funds nonprofits, social enterprises, and academic institutions that partner with government entities to deploy generative and agentic AI solutions to transform public service delivery. Selected organizations receive funding, participation in a Google.org Accelerator, technical support from Google AI experts, and Google Cloud credits.