NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The number of Common Vulnerabilities and Exposures identifiers (CVE IDs) created year over year has rapidly increased, and this trend is expected to continue
These images scream “manufacturing,” right? For NIST’s Jake Benzing, they certainly do. With an electron microscope by his side, the NRC postdoctoral fellow
Reducing the cybersecurity risk to one of the most vulnerable aspects of commerce — global supply chains — is the goal of a new publication by the National
NIST requests feedback on Draft NISTIR 8276, Key Practices in Cyber Supply Chain Risk Management: Observations from industry. This publication is based on an
In a recent Perspectives article in Nature Communications, NIST’s Elizabeth Strychalski and co-authors from industry and academia offer a framework for
Since NIST Special Publication (SP) 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations, was published in 2015
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has awarded a renewal of a $20 million cooperative agreement to Colorado
Alison Kahn is an Electronics Engineer with NIST's Public Safety Communications Research Division (PSCR) in Boulder, CO. In a predominantly male-dominated field
NIST's Public Safety Communications Research division (PSCR) awarded three applicants the Public Safety Innovation Accelerator Program: Mission Critical Voice
Cigarette butts pile up in parks, beaches, streets and bus stops, places where all types of littering are frowned upon. An estimated more than five trillion
Researchers at the National Institute of Standards and Technology (NIST) and their colleagues have for the first time created and imaged a novel pair of quantum
Criminals sometimes damage their mobile phones in an attempt to destroy evidence. They might smash, shoot, submerge or cook their phones, but forensics experts
Forget ice cube trays … we have microscopic molds for any shape we want. Scientists at NIST can now pour a polymer liquid into a template to make exact shapes —
In a general sense, an informative reference indicates how one document relates to another document. The National Cybersecurity Online Informative References
It might seem that estimating manufacturing industry costs (e.g., total machinery maintenance costs for all manufacturers) would be easy and have a great deal
Each year, the NIST Applied Economics Office assembles a report that examines public data on US manufacturing. The most recent report identified that US
Since 2000, an average of 72,000 wildfires per year have cleared seven million acres of land in the United States. 2015 was the largest wildfire year in
Cost examinations often run into the challenge of data uncertainty, where variables in the calculation (e.g., price of gasoline) will fluctuate over the study
What are you made of? With a new measurement technique from NIST’s Young Jong Lee, scientists can answer that question on the cellular level with 100 times more
As microservices-based applications are increasingly adopted within large enterprises and cloud-based environments, there is a need for a dedicated, scalable
Our data-driven society has a tricky balancing act to perform: building innovative products and services that use personal data while still protecting people’s
Meet Greta Babakhanova, a postdoctoral researcher here at NIST with boundless drive and a passion for reducing human suffering. It’s an ambitious goal that, for
Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results
Federal agencies, under the Federal Information Security Modernization Act of 2014 (FISMA) and Office of Management and Budget (OMB) circulars and memoranda
Silicon, found everywhere from the brick in your fireplace to the sand between your toes at the beach, also forms the basis of microchips in conventional