An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Cybersecurity and usability must coexist. Systems that prioritize usability over a strong security posture may fall prey to increasingly sophisticated cyber...
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise...
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process...
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect...
2019 NICE Conference & Expo November 18 - 20, 2019
Sheraton Grand Phoenix | Phoenix, AZ
The 2019 NICE Conference and Expo program committee is seeking...
Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission...
Join us as we expand the national effort to document the K12 cybersecurity education programs on-going throughout the country, accelerate methods to best...
NIST announces the publication of NIST Internal Report (NISTIR) 8214, Threshold Schemes for Cryptographic Primitives. This publication provides a high-level...
Summary
NIST requests public comments on Draft Special Publication 800-38G Revision 1, Recommendation for Block Cipher Modes of Operation: Methods for Format...
The NICE Program Office will be participating in the RSA Conference next week in San Francisco, California. See below for ways you can connect with us. We hope...
The past forty years have seen both the worldwide adoption of email and the simultaneous rise of Internet-based crimes and threats. While the Internet’s...
NIST Special Publication 800-162, Guide to Attribute Based Access Control (ABAC) Definition and Considerations, has been updated with minor editorial changes...
10th ANNUAL NICE CONFERENCE AND EXPO SAVE THE DATE: November 18-20, 2019 LOCATION: Phoenix, Arizona Visit the Conference website We are excited to announce that...
On Feb. 11, 2019, President Donald J. Trump issued the Executive Order on Maintaining American Leadership in Artificial Intelligence. The EO specifically...
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control...
GAITHERSBURG, Md.—Five years after the release of the Framework for Improving Critical Infrastructure Cybersecurity, organizations across all sectors of the...
The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our...
After over a year of evaluation, NIST would like to announce the candidates that will be moving on to the 2nd round of the NIST PQC Standardization Process....
Today, NIST is publishing NIST Special Publication (SP) 800-37 Revision 2 , Risk Management Framework for Information Systems and Organizations: A System Life...
The Winter 2018-19 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the...
In recent years, numerous routing control plane anomalies such as Border Gateway Protocol (BGP), prefix hijacking, and route leaks have resulted in Denial of...