NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The National Institute of Standards and Technology (NIST) yesterday issued the final publication describing how biometrics should be stored on Personal Identity
In an increasingly open environment of interconnected computer systems and networks, security is essential to ensure that information remains confidential, is
Dr. Virgil Gligor, one of the country's pioneering figures in computer security, will be presented with the 2006 National Information Systems Security Award by
Information technology has made it simpler and more convenient to handle a myriad of tasks online, such as booking a hotel, paying bills and ordering clothes
Today, federal agencies use computer systems and networks to store information and to interact with industry, private citizens and other governments both in
The National Institute of Standards and Technology would like comments on proposed changes to a Federal Information Processing Standard (FIPS) issued in
The National Institute of Standards and Technology (NIST) and Enterprise Integration Inc. (EII) are sponsoring a conference on how computer programs for
The Biometrics Consortium Conference 2005 will address the latest trends in research, development, testing and application of biometric technologies, especially
Widespread electronic attacks on computer systems have become commonplace with threats ranging from remotely launched attacks on network services to malicious
Handheld devices such as personal digital assistants are becoming indispensable tools for today's highly mobile workforce. Small and relatively inexpensive
The National Institute of Standards and Technology (NIST) has announced that it is running the Iris Challenge Evaluation (ICE), the first large-scale evaluation
The National Institute of Standards and Technology (NIST) has developed guidelines for federal agencies to use in planning and designing certification and
Cyber attackers are constantly scanning the Internet looking for vulnerabilities in computer systems that will enable them to take control and use the systems
To help federal agencies comply with the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST)
To help federal agencies improve their information technology security and comply with the Federal Information Security Management Act (FISMA) of 2002, the
Software that is poorly designed, inappropriate for specific tasks or just difficult to use can be frustrating, unproductive and costly for both businesses and
GAITHERSBURG, Md.—Computer scientists at the U.S. Commerce Department's National Institute of Standards and Technology (NIST) today released for public comment
President Bush has set a goal of widespread adoption of electronic health records within 10 years so that health information will follow patients throughout
The National Institute of Standards and Technology (NIST) is soliciting papers, presentations and other submissions for a workshop on Oct. 31-Nov. 1, 2005, in
Secretary of Commerce Carlos Gutierrez recently approved the withdrawal of the Data Encryption Standard (Federal Information Processing Standard 46-3) and two
Boulder, Colo.— A full-scale quantum computer could produce reliable results even if its components performed no better than today's best first-generation
The Commerce Department's National Institute of Standards and Technology (NIST) today released its final version of recommended security controls for federal
Computerized systems that automatically match fingerprints have become so sophisticated that the best of them are accurate more than 99 percent of the time
The fastest known cryptographic system based on transmission of single photons—the smallest pulses of light—has been demonstrated by a team at the Commerce
Quantum encryption systems use lasers to generate individual pulses of light called photons. Each photon is sent in one of two modes, either vertical/horizontal