An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST researchers utilized a suite of techniques typically reserved to investigate polymer dynamics and structure in nanocomposites with dispersed fillers to...
Register Now
We’re thrilled to announce that Early Bird Registration pricing is now open for the 2019 NICE K12 Cybersecurity Education Conference.
The...
As the volume of available data swells and analysis methods grow ever more sophisticated, a growing number of public safety agencies are turning to data...
A potentially useful material for building quantum computers has been unearthed at the National Institute of Standards and Technology (NIST), whose scientists...
Tiny nanoparticles play a gargantuan role in modern life, even if most consumers are unaware of their presence. They provide essential ingredients in sunscreen...
GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has released a plan for prioritizing federal agency...
GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) is awarding more than $6.6 million to fund research...
A prime suspect in the onset of Alzheimer’s and Parkinson’s diseases is a normally benign enzyme that is essential to proper development of the nervous system...
The National Cybersecurity Center of Excellence (NCCoE) has published the final version of NIST Cybersecurity Practice Guide SP 1800-7, Situational Awareness...
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise...
Appliances from refrigerators to thermostats are now available in models that interact with a wireless network, making them easier to control with a computer or...
As manufacturers create an incredible and ever-growing variety of Internet of Things (IoT) devices, they should also understand the cybersecurity risks...
As retailers in the United States have adopted chip-and-signature and chip-and-PIN (personal identification number) point-of-sale security measures, there have...
WASHINGTON — Ten researchers from the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) received the Presidential Early Career...
In late 2014, the Applied Economics Office (AEO) published NIST Special Publication (SP) 1176 , “Costs And Cost Effectiveness of Additive Manufacturing.” For...
Cryptography relies upon two basic components—an algorithm and a cryptographic key—to protect data in an information technology security environment. Such data...
The National Cybersecurity Center of Excellence (NCCoE) has released Draft NIST Special Publication (SP) 1800-21, Mobile Device Security: Corporate-Owned...
Showcasing precise control at the quantum level, physicists at the National Institute of Standards and Technology (NIST) have developed a method for making an...
This NIST Cybersecurity Practice Guide— Draft SP 1800-16, Securing Web Transactions: Transport Layer Security (TLS) Server Certificate Management—shows large...
The quantum logic clock—perhaps best known for showing you age faster if you stand on a stool—has climbed back to the leading performance echelons of the world...
Six members of the NIST Fire Research Division (including three current or former members of the Flammability Reduction Group) recently traveled to the Royal...
Researchers at the National Institute of Standards and Technology (NIST) have upgraded their compact atomic gyroscope to enable multitasking measurement...
Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results...
Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security...