An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The Spring 2020 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the
NIST has updated its key management guidance in S pecial Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This
NIST has updated its key management guidance in Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This
U.S. Government concerns about the cybersecurity of electric vehicle supply equipment (EVSE) infrastructure cover a range of issues. What impact would EVSE have
When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable
NIST requests comments on the Draft Cybersecurity White Paper, Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security
GAITHERSBURG, Md. — Today, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) and the White House Office of Science and
Notice of Funding Opportunity NIST is pleased to announce funding on behalf of the National Initiative for Cybersecurity Education (NICE) for the NICE K12
6th Annual NICE K12 Cybersecurity Education Conference Call for Presentations: Open April 1 – June 30, 2020 The 2020 NICE K12 Cybersecurity Education Conference
The National Cybersecurity Center of Excellence (NCCoE) is requesting feedback on a Draft NIST Cybersecurity White Paper, Methodology for Characterizing Network
NIST requests comments on Draft Special Publication (SP) 800-210, General Access Control Guidance for Cloud Systems, which presents an initial step toward
A high-end race car engine needs all its components tuned and working together precisely to deliver top-quality performance. The same can be said about the
Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security
11th ANNUAL NICE CONFERENCE AND EXPO Call for Presentations: Open March 24 – May 31, 2020 The 2020 NICE Conference program committee is seeking timely, topical
Today mobile devices are ubiquitous, and they are often used to access enterprise networks and systems to process sensitive data. Draft NIST Special Publication
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which
NIST Special Publications (SP) 800-140 and -140A through -140F are now available. With the completion of these documents, the Cryptographic Module Validation
Today, NIST has published NISTIR 8170 , Approaches for Federal Agencies to Use the Cybersecurity Framework. It provides guidance on how the Framework for
As millions of Americans transition from an office environment to their homes to continue to work, maintaining cybersecurity while teleworking is imperative
All enterprises should ensure cybersecurity risk gets the appropriate attention within their enterprise risk management (ERM) programs, which address all types
After your organization forms a general plan for tackling its cybersecurity and privacy risk management issues, it needs particular state-of-the-art tools to
There is an urgent need to strengthen the trustworthiness and resilience of the information systems, component products, and services that we depend on in every
NIST requests comments on Draft NISTIR 8272, Impact Analysis Tool for Interdependent Cyber Supply Chain Risks, which describes a prototype tool developed to