NIST logo

News in ITL

08/12/14
  • NIST, IAPP Host Privacy Engineering Workshop in September 2014

  • 08/01/14
  • Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls

  • 07/31/14
  • Registration Opens for the Next Cybersecurity Framework Workshop

  • 07/29/14
  • NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security

  • 07/14/14
  • Digital Crime-Fighters Face Technical Challenges with Cloud Computing

  • 07/01/14
  • The Vivid Realism of 3D Functions, Right There on Your Browser

  • 06/25/14
  • New Math Technique Improves Atomic Property Predictions to Historic Accuracy

  • 06/23/14
  • NIST Seeks Members for Three New Cloud Computing Working Groups

  • 06/03/14
  • NIST: Performance of Facial Recognition Software Continues to Improve

  • Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains

  • 05/29/14
  • NIST Requests Public Comment on Proposed SHA-3 Cryptographic

  • 05/13/14
  • New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up — Public Comments Welcomed

  • NIST RPKI Test and Measurement Tool

  • 05/06/14
  • NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies

  • 04/30/14
  • NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks

  • 04/22/14
  • Free NIST Web-Based Program Manages the App Vetting Workflow

  • NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014

  • 04/21/14
  • NIST Removes Cryptography Algorithm from Random Number Generator Recommendations

  • 03/26/14
  • Engineering for Privacy: NIST Workshop Meets April 9-10, 2014

  • NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge

  • NIST Information Technology Professionals Recognized for Excellence

  • 03/07/14
  • March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science

  • NIST Issues Guidance for Federal Use of Secure Mobile Technology

  • 02/25/14
  • NCCoE Launches Building Blocks for Access Control and Mobile Devices

  • 02/19/14
  • NIST Requests Comments on its Cryptographic Standards Process

  • 02/12/14
  • NIST Releases Cybersecurity Framework Version 1.0

  • 02/11/14
  • NIST to Hold Cryptographic Key Management Workshop March 4-5

  • 01/14/14
  • Quantum Physics Could Make Secure, Single-Use Computer Memories Possible

  • 12/26/13
  • NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence

  • 12/17/13
  • 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing

  • 12/03/13
  • Three NIST IT Staff Named To Top 15 "Forward-Thinking People in Government IT" List

  • 11/20/13
  • Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30

  • 11/05/13
  • NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award

  • Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People

  • 10/30/13
  • White House Blog: Seeking Cybersecurity Framework Comments

  • 10/22/13
  • NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments

  • 09/23/13
  • Grants to Two States Will Support Improved Access to Services and Reduce Fraud

  • NCCoE Launches New Building Block

  • 09/17/13
  • NIST Awards Grants to Improve Online Security and Privacy

  • 09/04/13
  • Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices

  • 09/03/13
  • Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19

  • NIST October Workshop to Explore Intersection of Cloud Computing and Mobility

  • 08/20/13
  • NIST Study Advances Use of Iris Images as a Long-Term Form of Identification

  • Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards

  • Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance

  • 08/05/13
  • Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013

  • 07/25/13
  • The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios

  • 07/23/13
  • NIST Releases Updates to Digital Signature Standard

  • 07/12/13
  • Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly

  • 07/02/13
  • NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure

  • 06/28/13
  • NIST Calls for Suggestions to Speed Computer Incident Teams Responses

  • 06/25/13
  • Revised Security Guidelines Provide Strategy for Government Mobile Device Management

  • 06/20/13
  • NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop

  • 06/11/13
  • NIST Publishes Draft Cloud Computing Security Document for Comment

  • 05/16/13
  • NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure

  • 04/30/13
  • NIST Issues Major Revision of Core Computer Security Guide: SP 800-53

  • 04/25/13
  • Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013

  • 04/22/13
  • NIST Announces Plan to Sponsor First Cybersecurity FFRDC

  • 04/17/13
  • Eleven Companies Join as Partners in National Cybersecurity Center of Excellence

  • Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand

  • May Conference to Discuss Safeguarding Health Information Through HIPAA Security

  • NIST to Host Symposium on 'Ontology Evaluation' May 2-3, 2013

  • 04/15/13
  • Industry Partners Join the National Cybersecurity Center of Excellence

  • 03/05/13
  • March Conference Focuses on New Trends in Cybersecurity and Information Security Education

  • NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics

  • NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data

  • Three NIST IT Leaders' Are Honored with 2013 Federal 100 Awards

  • 02/26/13
  • NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure

  • 02/20/13
  • January 15-16 Cloud and Big Data Conference Video Available On Demand

  • 02/13/13
  • National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework

  • 02/06/13
  • Cybersecurity Center Project to Secure Health Information

  • NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document

  • NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace

  • NIST to Host February 2013 Symposium on the Future of Voting Systems

  • 01/14/13
  • NIST Biometric Workshop Studies Voice, Dental, Oral Standards

  • 12/12/12
  • New NIST Document Offers Guidance in Cryptographic Key Generation

  • 11/29/12
  • Cloud Computing and Big Data Intersect at NIST, January 15-17

  • 11/27/12
  • NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain

  • 10/31/12
  • NIST Provides Draft Guidelines to Secure Mobile Devices

  • 10/16/12
  • New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard

  • 10/05/12
  • NIST Revises Software Patch Management Guide for Automated Processes

  • 10/02/12
  • NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition

  • Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track

  • 09/20/12
  • Five Pilot Projects Receive Grants to Promote Online Security and Privacy

  • 09/18/12
  • New NIST Publication Provides Guidance for Computer Security Risk Assessments

  • October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management

  • 08/21/12
  • NIST Co-Sponsors the 2012 Biometrics Consortium Conference

  • Security First: New NIST Guidelines on Securing BIOS for Servers

  • 08/08/12
  • NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission

  • Steering Group for Identity Ecosystem Hosts First Meeting

  • Updated NIST Guide is a How-To for Dealing With Computer Security Incidents

  • 07/25/12
  • NIST Updates Guidance on Network Attacks and Malware

  • Software Features and Inherent Risks: NIST's Guide to Rating Software Vulnerabilities from Misuse

  • 07/11/12
  • NIST Issues Guidance for Pediatric Electronic Health Records

  • NIST Releases Second Draft of Federal ID Credential Security Standard for Comment

  • NIST Releases Test Framework for Upgrading Smart Electrical Meters

  • NIST Updates Guidelines for Mobile Device Security

  • 06/12/12
  • New Quantum Computing Algorithm Could Simulate Giant Particle Accelerators

  • NIST Releases Final Version of Revised Bluetooth Security Guide

  • NIST Will Hold ‘Big Data’ Workshop June 13-14, 2012

  • 05/31/12
  • Quantum Computers Will Be Able to Simulate Particle Collisions

  • 05/29/12
  • New Cybersecurity Center Kicks Off with Workshop

  • NIST Special Publication Helps to Demystify Cloud Computing

  • 05/09/12
  • Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop

  • 05/07/12
  • A User-Centered Approach to Designing Electronic Health Records

  • 05/04/12
  • Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain

  • 05/02/12
  • Cloud Computing Forum & Workshop V Meets June 5-7 at the Department of Commerce

  • 05/01/12
  • No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere

  • 04/17/12
  • Fifth Annual Health Information Security Conference Runs June 6-7

  • Iris Recognition Report Evaluates 'Needle in Haystack' Search Capability

  • NIST Proposes Update to Digital Signature Standard

  • 04/03/12
  • April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls

  • McFadden Named 2012 SIAM Fellow

  • 03/20/12
  • NIST Releases Technical Guidance for Evaluating Electronic Health Records

  • 03/12/12
  • NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace

  • 03/06/12
  • Guidance on Wireless Local Area Network Security is Close at Hand

  • 02/28/12
  • Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls

  • 02/21/12
  • NIST Establishes National Cybersecurity Center of Excellence

  • NIST Requests Comments on Updated Guide to Handling Computer Security Incidents

  • 02/16/12
  • NIST Seeks Health Record System Manufacturers to Assist in Usability Testing

  • 02/07/12
  • Federal Information Systems Security Educators' Association Conference Meets March 27-29

  • NIST Cloud Computing Videos Available Online

  • NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace

  • 01/24/12
  • International Community Gathers at NIST in March to Discuss Biometric Performance and Testing

  • March Workshop to Support Trusted IDs in Cyberspace

  • NIST Issues Cloud Computing Guidelines for Managing Security and Privacy

  • NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organization's IT System Security

  • 01/10/12
  • Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging

  • 12/20/11
  • Protecting Computers at Start-Up: New NIST Guidelines

  • 12/13/11
  • NIST Special Publication Expands Government Authentication Options

  • 12/06/11
  • New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions

  • 11/22/11
  • New HIPAA Tool Helps Organizations Meet Security Requirements

  • NIST Improves Tool for Hardening Software Against Cyber Attack

  • Romine Named Director of NIST's Information Technology Laboratory

  • 11/08/11
  • Draft Roadmap for Cloud Computing Technology

  • NICE Issues Cybersecurity Workforce Framework for Public Comment

  • NIST Signs Agreement to Enhance Cybersecurity Education Programs

  • 11/01/11
  • NIST Releases Draft Cloud Computing Technology Roadmap for Comments

  • 10/25/11
  • Final Version of NIST Cloud Computing Definition Published

  • NIST Digital Library of Mathematical Functions Receives IT Award

  • NIST Releases Two Wireless Security Guides, Requests Comment

  • 10/13/11
  • Federal Cloud Technology Roadmap to be Introduced at Forum & Workshop, Nov. 2-4

  • NIST Publishes Guide for Monitoring Security in Information Systems

  • 10/04/11
  • Public/Private Leaders Collaborate on Ways to Fight Botnets

  • 09/20/11
  • Comprehensive Risk Assessment Guidance for Federal Information Systems Published

  • 09/13/11
  • Four New Reports Update Security Content Automation Protocol

  • NIST to Host Workshop on Cryptography for New Technologies

  • Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2

  • Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture

  • 08/11/11
  • NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan

  • 08/02/11
  • NIST Co-sponsors Biometrics Consortium Conference, Sept. 27-29 in Tampa, Florida

  • September NICE Workshop to Focus on Engaging Americans in Cyberspace Safety

  • 07/19/11
  • New Version of Security Automation Protocol Includes Digital Trust Model

  • NIST Proposes New Privacy Controls for Federal Information Systems and Organizations

  • 06/21/11
  • Calling for Comments on Cybersecurity, Innovations and the Internet Economy

  • 06/08/11
  • Commerce Department Proposes New Policy Framework to Strengthen Cybersecurity Protections for Businesses Online

  • 05/17/11
  • NIST Workshop to Advance Usability in Electronic Health Records

  • 05/12/11
  • NIST Seeks Comments on Draft Guide to Cloud Computing

  • 04/28/11
  • Build Safety into the Very Beginning of the Computer System

  • 04/26/11
  • White House Launches Plan to Create a Trusted 'Identity Ecosystem' for On-Line Commerce

  • 03/30/11
  • NIST's Ron Ross is Named to InformationWeek Government Top 50 List

  • 03/15/11
  • Conference on Safeguarding Health Information Security, May 10-11

  • Dodson Receives ‘Federal 100’ Award for Cybersecurity Work

  • NIST Holds Third Cloud Computing Forum and Workshop, April 7-8

  • Two New SCAP Documents Help Improve Automating Computer Security Management

  • 03/01/11
  • New Publication Fundamentally Changes Federal Information Security Risk Management

  • NIST Expert Software 'Lowers the Stress' on Materials Problems

  • NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations

  • 02/15/11
  • Emerging Trends in Cybersecurity is Topic of March IT Security Trainers' Conference

  • Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging

  • The NIST Role in Role-Based Control: A 20th Anniversary Appraisal

  • 02/01/11
  • Cloud Computing at NIST: Two New Draft Documents and a Wiki

  • NIST Issues Final Version of Full Virtualization Security Guidelines

  • 01/31/11
  • Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC

  • 01/07/11
  • Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity

  • 01/05/11
  • And Then There Were Five: Finalists Advance in NIST's SHA-3 Cryptography Competition

  • IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol

  • Two Publications Recommend Organization-Wide IT Security Risk Management

  • 12/08/10
  • Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS

  • NIST Team Awarded Millions of Supercomputing Hours, Aims for 'Concrete Results'

  • 11/09/10
  • New NIST Publication Provides Security Guidance for WiMAX Technologies

  • Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy

  • 10/13/10
  • NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5

  • 08/31/10
  • Annual IT Security Automation Conference Runs Sept. 27-29

  • 08/17/10
  • NIST Publishes Approved Testing Procedures for Electronic Health Records

  • 08/03/10
  • Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation

  • New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning

  • 07/27/10
  • Cybersecurity, Innovation and the Internet Economy

  • 07/21/10
  • New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology

  • NIST Aids Enhancement of the Security and Stability of the Internet’s Domain Name System

  • 07/06/10
  • NIST Software Security Patent to Help Improve Health IT Privacy

  • Updated Computer Security Publication Focuses on Security Assessment Plans

  • 06/23/10
  • July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation

  • National Initiative For Cybersecurity Education (NICE)ly Comes to You

  • 06/09/10
  • NIST Helps Accelerate the Federal Government's Move to the Cloud

  • 05/25/10
  • July Workshop Devoted to Improving Usability of Health Care IT

  • 05/11/10
  • Comments Sought on Updated Guide for Assessing Federal IT Security Controls

  • NIST Releases Successor to Venerable Handbook of Math Functions

  • 04/27/10
  • NIST Joins Task Force to Study Nexus Between Innovation and Privacy Policy

  • USGv6 Stakeholders Meet to Discuss Testing Program and Updated Protocol

  • 04/13/10
  • FISMA Project Manager Ron Ross Named to 2010 Federal 100 List

  • 03/30/10
  • Health Information Security Conference to Run May 11-12 in D.C.

  • 03/16/10
  • Key to Security: Biometrics Standards

  • March Workshop at NIST to Focus on Preserving Our Digital Data

  • NIST, Partners Develop Testing Infrastructure for Health IT Systems

  • 03/02/10
  • Comments Requested on Draft Guidelines for the Secure Deployment of IPv6

  • First Test Labs for Next-Generation Internet Protocol (IPv6) Are Accredited

  • NIST Releases Guide for Applying the Risk Management Framework to Federal Information Systems

  • Role-Based Training for IT Security Is the Topic of March Educators’ Conference

  • 02/16/10
  • International Biometrics Conference to Meet at NIST March 2-4

  • 01/12/10
  • Theorists Close In on Improved Atomic Property Predictions

  • 12/15/09
  • Handheld Touch Screen Device May Lead to Mobile Fingerprint ID

  • NIST Seeks Comments on Cryptography Standards Publication

  • NIST Updates Automated Computer Security Validation Guidelines

  • Text Retrieval Expert Named Distinguished Scientist by Computing Group

  • 12/01/09
  • NIST Develops Experimental Validation Tool for Cell Phone Forensics

  • 11/17/09
  • Certification and Accreditation Process for Federal Information Systems Transformed

  • Computer Researcher Named Distinguished Fellow of Information Security Group

  • 11/03/09
  • NIST Test Proves ‘The Eyes Have It’ for ID Verification

  • 10/06/09
  • New Computer Security Guide Can Help Safeguard Your Small Business

  • New Publication Offers Security Tips for WiMAX Networks

  • 09/22/09
  • October IT Security Automation Conference to Highlight Healthcare IT, Cloud Computing

  • Workshop Aims to Establish Standards for Voting Machine Data

  • 09/08/09
  • New NIST Publications Describe Standards for Identity Credentials and Authentication Systems

  • 08/25/09
  • Biometrics Conference Meets Sept. 22–24 in Florida

  • Up-Scale: Frequency Converter Enables Ultra-High Sensitivity Infrared Spectrometry

  • Who Are You? Mobile ID Devices Find Out Using NIST Guidelines

  • 08/11/09
  • NIST Releases Final Version of New Cybersecurity Recommendations for Government

  • 07/14/09
  • New Report on Improving Software Tools that Improve Software

  • 06/30/09
  • Workshop to Aim for Security, Accessibility in Future Voting Systems

  • 06/16/09
  • NIST Issues Latest Guidelines for Teleworking Security

  • NIST, DOD, Intelligence Agencies Join Forces to Secure U.S. Cyber Infrastructure

  • 06/04/09
  • Announcing DRAFT NIST SP500-267 A Profile for IPv6 in the U.S. Government - Version 1.0 (Draft 2)

  • 06/02/09
  • NIST Delivers Updated Draft Standards for Electronic Voting Machines

  • 06/01/09
  • ANTD assists in the completion of the IEEE 802.21 Media Independent Handovers (MIH) standard specifications

  • NIST Delivers Updated Draft Standards for Electronic Voting Machines -- Guidelines to Assist in Testing Voting System Accuracy, Reliability and Security

  • Revision for Secure Domain Name System (DNS) Deployment Guide

  • 05/20/09
  • NIST Defining the Expanding World of Cloud Computing

  • NIST Validation Program Tests Next-Generation Internet Products

  • 05/05/09
  • NIST Issues Draft Guide for Automating Computer Security Verification

  • 04/21/09
  • FISMA Project Manager Named to ISSA Hall of Fame

  • New NIST Guidelines for Organization-Wide Password Management

  • Researchers Give High Marks to New Technology for Fingerprint Identification

  • Two NIST Computer Security Professionals Named to 2009 Federal 100 List

  • 04/07/09
  • NIST Issues Open and Transparent Methods for Testing Electronic Voting Systems

  • Quantum Computers Will Require Complex Software to Manage Errors

  • 03/10/09
  • Safer Net Surfing Is Goal of NIST Domain Name Security Experts

  • 02/24/09
  • Updated Recommendations for Protecting Wireless, Remote Access Data

  • 02/10/09
  • First Major Update to SP 800-53 Is Available for Public Comment

  • 01/13/09
  • Sorting Diamonds from Toothbrushes: New Guide to Protecting Personal Information

  • 12/23/08
  • Electronic Methods Potentially Secure for Sending Blank Ballots Overseas; Serious Issues Remain for Receiving Votes -- NIST Report Identifies Security Threats and Potential Controls for Overseas Voting

  • NIST Posts 51 Entries for New Hash Algorithm Competition

  • NIST Report Identifies Security Threats, Possible Controls for Overseas Voting

  • 12/09/08
  • Belgium to Host First Conference for New Hash Algorithm Competition

  • Sevenfold Accuracy Improvement for 3-D 'Virtual Reality' Labs

  • 11/25/08
  • Saying ‘Cheese’ for More Effective Border Security

  • 11/12/08
  • NIST Receives 64 Submissions for New ‘Hash’ Algorithm

  • 10/14/08
  • Updated Specification Issued for PIV Card Implementations

  • 09/16/08
  • New Profile Lays Out Roadmap, Standards for Government Use of IPv6

  • Upgraded Vulnerability Database Enables Advances in Security Automation

  • 09/03/08
  • Biometric Consortium Conference 2008 Will Be Held Sept. 23-25

  • NIST To Host 4th Security Automation Conference and Workshop

  • 08/19/08
  • NIST Requests Comments on Next Generation C/A Process for Information Systems

  • 08/06/08
  • NIST Debuts New Approach to Ad Hoc Networks for First Responders

  • Updated Information Security Performance Measurement Guide Published

  • Vegas ‘Quantum Spookshow’ Demos On-the-Fly Encryption of Streaming Video

  • 07/22/08
  • How Secure Is Your Network? NIST Model Knows

  • 07/09/08
  • New NIST Pub Can Help IT Managers Assess Security Controls

  • Software Helps Developers Get Started with PIV Cards

  • Wake-Up Call: Draft Security Pub Looks at Cell Phones, PDAs

  • 06/24/08
  • NIST Releases Preview of Much-Anticipated Online Mathematics Reference

  • 05/28/08
  • Text Retrieval Trials Focus on Searching Blogs and Legal Documents

  • Two for One: NIST Design Enables More Cost Effective Quantum Key Distribution

  • 05/13/08
  • NIST Tool Helps Internet Master Top-level Domains

  • 04/15/08
  • Comments Requested on Risk Management Publication

  • 04/01/08
  • Michael D. Schroeder to Receive NIST/NSA Security Award

  • New NIST Publication Recommends Best Fits Between Federal ‘Locks’ and ‘Keys’

  • NIST Shows On-card Fingerprint Match Is Secure, Speedy

  • 03/18/08
  • NIST Votes for U.S. Approval of the Modified Office Open XML Standard

  • 02/05/08
  • New Web Site Lists Validated Software Security Tools for Federal IT

  • Revised NIST IPv6 Profile Released for Comment

  • 01/23/08
  • Concrete Flow Researchers to Use Argonne Supercomputer

  • 01/08/08
  • January Workshop to Focus on Safeguarding Health Care Information

  • 12/07/07
  • ‘Combinatorial’ Approach Squashes Software Bugs Faster, Cheaper

  • 11/08/07
  • New Scoring System Protects Credit Card Transactions

  • NIST Issues Call for a New 'Hash' Algorithm

  • 10/25/07
  • Framework Document on Cybersecurity Open for Public Comment

  • NIST Licenses Systems to Help the Blind ‘See’ Images

  • 10/11/07
  • How to Protect Your Web Server from Attacks

  • 09/27/07
  • High-Speed Quantum Key System Wins Research Award

  • 09/13/07
  • "Guide to Secure Web Services" Provides Blueprint to Safer Web 2.0

  • Voting Standards Guidance Sent to Election Commission

  • 08/31/07
  • NIST Votes for U.S. 'Approval with Comments' on Office Open XML Standard to Meet International Voting Deadline

  • 08/30/07
  • NIST Measures Challenges for Wireless in Factories

  • Upgraded Software Makes ID Verification Testing Easier

  • 08/03/07
  • Comments Sought on New Security Publications

  • New Tools to Help Configure Secure Operating Systems

  • 07/20/07
  • Tailoring Computer Security for Industrial Controls

  • 06/08/07
  • Computer Guide May Boost Security Testing Efficiency

  • New Quantum Key System Combines Speed, Distance

  • 02/01/07
  • NIST Issues Draft IPv6 Technical Profile

  • 12/21/06
  • December 21, 2006

  • Participants Wanted for 2007 Text Retrieval Trials

  • Tool Helps Write Rules for XML Communication

  • 11/09/06
  • 2006 Machine Translation Evaluation Results Posted

  • NIST Issues Info Security Primer for Managers

  • Steven Bellovin to Receive NIST/NSA Security Award

  • 10/26/06
  • Vulnerability Database Hits 20,000 Software-Flaw Mark

  • 10/12/06
  • NIST Issues Four-Pack of Computer Security Pubs

  • 09/28/06
  • Comments Sought on New IT Security Guides

  • 09/14/06
  • NIST Guide Details Forensic Practices for Data Analysis

  • 08/31/06
  • How-To Guide for Removing Data from Storage Media

  • 08/17/06
  • Draft Guidance on Improving Security of Home Computers

  • 08/03/06
  • NIST Makes Changes to Key Security Publication

  • 07/20/06
  • NIST Can Help You 'MBARK' onto Better Biometric Systems

  • 06/22/06
  • Draft Guide Will Help Make WLANs More Secure

  • NIST’s FISMA Team Receives AFFIRM Leadership Award

  • 06/08/06
  • Alliance Donates Health IT Standards Directory to NIST

  • 05/25/06
  • Registration Open for Biometrics Conference

  • 05/12/06
  • Furlani Named Director of NIST’s IT Lab

  • 03/16/06
  • Algorithm Advance Produces Quantum Calculation Record

  • 02/16/06
  • Telecom Meeting to Focus on Emerging Networks

  • 02/02/06
  • NIST Issues Final Federal Biometric Specs

  • 01/17/06
  • Updated Federal Guide on Cryptography Available

  • 11/17/05
  • Virgil Gligor to Receive NIST/NSA Security Award

  • 10/20/05
  • NIST Develops Health Care IT Standards Repository

  • 10/07/05
  • Federal Cryptography Guide Available for Comment

  • 09/09/05
  • Comments Sought on Revision of Federal ID Standard

  • Experts To Examine Virtual Enterprise Uses of Info Tech

  • 08/26/05
  • Conference to Highlight New Biometric Technologies

  • Improving Security of Handheld IT Devices

  • IT Program Hopes to Foster Better Security Checklists

  • 08/10/05
  • Comprehensive Database of Computer Vulnerabilities Now Available

  • First Large-Scale Evaluation of Iris Recognition Under Way

  • Guidelines Issued for Certifying, Accrediting PIV Card Issuers

  • 07/26/05
  • Comments Sought on Draft Federal IT Security StandardComments Sought on Draft Federal IT Security Standard

  • Draft Guidelines Released for IT Security Controls

  • Usability Standard Achieves International Status

  • 06/30/05
  • NIST Outlines Support for Health IT Initiative

  • Submissions Requested for Crypto Hash Workshop

  • 06/02/05
  • NIST Withdraws Outdated Data Encryption Standard
  • Contact

    General Information:
    301-975-2900 Telephone
    301-975-2378 Facsimile

    100 Bureau Drive, M/S 8900
    Gaithersburg, MD 20899-8900