An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST announces the publication of NIST Special Publication (SP) 800-133 Revision 2, Recommendation for Cryptographic Key Generation , which discusses the
Digital forensics experts often extract data from computers and mobile phones that may contain evidence of a crime. Now, researchers at the National Institute
Some cybersecurity best practices and guidance for Internet of Things (IoT) device manufacturers are now available from NIST’s Cybersecurity for IoT Program
As microservices-based applications are increasingly deployed within large enterprises and cloud-based environments, dedicated and scalable infrastructure is
NIST's National Cybersecurity Center of Excellence (NCCoE) is initiating the development of practices to ease the migration from the current set of public-key
Federal agencies are directed to implement a program to continuously monitor their organizational information security status. NIST Special Publication (SP) 800
The Spring 2020 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the
NIST has updated its key management guidance in Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This
NIST has updated its key management guidance in S pecial Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This
U.S. Government concerns about the cybersecurity of electric vehicle supply equipment (EVSE) infrastructure cover a range of issues. What impact would EVSE have
NIST requests comments on the Draft Cybersecurity White Paper, Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security
When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable
GAITHERSBURG, Md. — Today, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) and the White House Office of Science and
Notice of Funding Opportunity NIST is pleased to announce funding on behalf of the National Initiative for Cybersecurity Education (NICE) for the NICE K12
6th Annual NICE K12 Cybersecurity Education Conference Call for Presentations: Open April 1 – June 30, 2020 The 2020 NICE K12 Cybersecurity Education Conference
NIST requests comments on Draft Special Publication (SP) 800-210, General Access Control Guidance for Cloud Systems, which presents an initial step toward
The National Cybersecurity Center of Excellence (NCCoE) is requesting feedback on a Draft NIST Cybersecurity White Paper, Methodology for Characterizing Network
Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security
A high-end race car engine needs all its components tuned and working together precisely to deliver top-quality performance. The same can be said about the
11th ANNUAL NICE CONFERENCE AND EXPO Call for Presentations: Open March 24 – May 31, 2020 The 2020 NICE Conference program committee is seeking timely, topical
Today mobile devices are ubiquitous, and they are often used to access enterprise networks and systems to process sensitive data. Draft NIST Special Publication
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which