An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
A new study of face recognition technology created after the onset of the COVID-19 pandemic shows that some software developers have made demonstrable progress
NISTIR 8278, National Online Informative References (OLIR) Program: Program Overview and OLIR Uses, describes the OLIR Program, what OLIRs are, what benefits
THANK YOU FOR MAKING NATIONAL CYBERSECURITY CAREER AWARENESS WEEK A SUCCESS! Thank you all for your hard work and dedication during the week-long campaign and
New NICE Framework Released The National Initiative for Cybersecurity Education (NICE) released the first revision to the Workforce Framework for Cybersecurity
NIST requests comments on Draft Federal Information Processing Standard (FIPS) 201-3, Personal Identity Verification (PIV) of Federal Employees and Contractors
NIST announces the release of Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes . This publication supplements FIPS 186
NIST Special Publication (SP) 800-53B, Control Baselines for Information Systems and Organizations, provides security and privacy control baselines for the
If you’ve ever tried to set up a home entertainment system by poring over a thick manual, you might appreciate the manufacturer also providing you with a quick
The National Initiative for Cybersecurity Education (NICE) today released the NICE Strategic Plan at the annual NICE Conference and Expo 2020. The event is
Storage infrastructure—along with compute (encompassing OS and host hardware) and network infrastructures—is one of the three fundamental pillars of Information
Taking another step toward strengthening the nation’s critical infrastructure, the National Institute of Standards and Technology (NIST) has drafted guidelines
Today, NIST is publishing NIST Technical Note (TN) 2111, An Empirical Study on Flow-based Botnet Attacks Prediction. In the era of the Internet of Things
NIST has released Draft NISTIR 8323, Cybersecurity Profile for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services, for public review and
The increasing frequency, creativity, and variety of cybersecurity attacks means that all enterprises should ensure cybersecurity risk receives the appropriate
Cheaper refrigerators? Stronger hip implants? A better understanding of human disease? All of these could be possible and more, someday, thanks to an ambitious
Donna Dodson, a cybersecurity expert who worked for her entire 33-year career at the National Institute of Standards and Technology (NIST), has been honored
NIST announces the publication of NISTIR 8183 Revision 1, Cybersecurity Framework Version 1.1 Manufacturing Profile. This revision of the CSF Manufacturing
A multidisciplinary research team at the National Institute of Standards and Technology (NIST) has developed a way to increase the sensitivity of the primary
The National Cybersecurity Center of Excellence (NCCoE) at NIST is actively engaged in helping organizations address the challenge of ransomware and other data
Draft NIST Interagency Report (NISTIR) 8212, ISCMA: An Information Security Continuous Monitoring Program Assessment, provides an operational approach to the
Traditional data and operations management across organizations and on the web can involve inefficient transaction reconciliation between siloed databases
Public safety officials utilizing the forthcoming public safety broadband networks will have access to devices, such as smartphones, tablets and wearables
2020 NICE Conference & Expo REGISTRATION NOW OPEN WEEKLY CONFERENCE SUB-THEMES Growing & Sustaining the NICE Community Tuesday, October 27 | 1 - 5:15 PM EDT The
NIST is planning to update NIST Special Publication (SP) 800-55 Revision 1, Performance Measurement Guide for Information Security. For more details on an