An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Meet Shanée Dawkins, a computer scientist whose expertise in the way people interact with technology extends in multiple directions, from phishing to public
Today, NIST is publishing NIST IR 8323r1, Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and
NIST requests public comments on NIST IR 8214C ipd (initial public draft), NIST First Call for Multi-Party Threshold Schemes, for primitives organized into two
Despite Slowing Economy, Demand for Cybersecurity Workers Remains Strong Today during the Federal Cybersecurity Workforce Webinar on Providing Timely and Clear
NIST is announcing the initial public drafts of NIST SP 800-157r1 (Revision 1), Guidelines for Derived Personal Identity Verification (PIV) Credentials, and
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines. Currently, we are reviewing the following publication
NIST recognizes the importance of the infrastructure that provides positioning, timing, and navigation (PNT) information to the scientific knowledge, economy
In August 2021, NIST’s Crypto Publication Review Board initiated a process to review NIST Special Publication (SP) 800-107 Revision 1, Recommendation for
As a part of the periodic review of NIST’s cryptographic standards and guidelines, NIST's Crypto Publication Review Board ("Review Board") announced the review
The rapid proliferation of online services over the past few years has heightened the need for reliable, equitable, secure, and privacy-protective digital
NIST is introducing a plan to transition away from the current limited use of the Secure Hash Algorithm 1 (SHA-1) hash function. Other approved hash functions
In January 2022, NIST's Crypto Publication Review Board initiated a review process for NIST Special Publication (SP) 800-106, Randomized Hashing for Digital
As a part of the periodic review of NIST’s cryptographic standards and guidelines, NIST's Crypto Publication Review Board announced the review of Federal
NIST is seeking public comments on two draft NIST Internal Reports (NIST IR) for the National Online Informative References (OLIR) Program. This Program is a
The NICE K12 Cybersecurity Education Conference took place this week in St. Louis, Missouri. The conference brought together over 400 participants and featured
The Cybersecurity Apprenticeship Sprint , a national campaign to promote Registered Apprenticeships to develop the cybersecurity workforce, ended this week
NIST has published Special Publication (SP) 800-215, Guide to a Secure Enterprise Network Landscape. Access to multiple cloud services (e.g., IaaS, SaaS), the
Business impact analyses (BIAs) have been traditionally used for business continuity and disaster recovery (BC/DR) planning to understand the potential impacts