An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary draft practice guide, SP 1800-15, Securing Small-Business and Home Internet
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the
NIST Special Publication (SP) 800-163 Revision 1, Vetting the Security of Mobile Applications, is an important update to NIST guidance on mobile application
NIST has completed the initial check of all algorithm submission packages received in response to the August 27, 2018 Request for Nominations for Lightweight
The Spring 2019 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the
We invite you to join us for the 32nd annual FISSEA conference on June 27-28, 2019! This year’s theme is Innovations in Cybersecurity Awareness and Training: A
In late Fall 2018, NICE staff participated in a convening of experts from corporate, academic, nonprofit, and government backgrounds to consider new ideas and
Cybersecurity and usability must coexist. Systems that prioritize usability over a strong security posture may fall prey to increasingly sophisticated cyber
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process
Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission
Join us as we expand the national effort to document the K12 cybersecurity education programs on-going throughout the country, accelerate methods to best
NIST announces the publication of NIST Internal Report (NISTIR) 8214, Threshold Schemes for Cryptographic Primitives. This publication provides a high-level
Summary
NIST requests public comments on Draft Special Publication 800-38G Revision 1, Recommendation for Block Cipher Modes of Operation: Methods for Format
The NICE Program Office will be participating in the RSA Conference next week in San Francisco, California. See below for ways you can connect with us. We hope
The past forty years have seen both the worldwide adoption of email and the simultaneous rise of Internet-based crimes and threats. While the Internet’s
NIST Special Publication 800-162, Guide to Attribute Based Access Control (ABAC) Definition and Considerations, has been updated with minor editorial changes
10th ANNUAL NICE CONFERENCE AND EXPO SAVE THE DATE: November 18-20, 2019 LOCATION: Phoenix, Arizona Visit the Conference website We are excited to announce that
On Feb. 11, 2019, President Donald J. Trump issued the Executive Order on Maintaining American Leadership in Artificial Intelligence. The EO specifically
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control