An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST Special Publication (SP) 800-231, Bugs Framework (BF): Formalizing Cybersecurity Weaknesses and Vulnerabilities, is now available. It presents an overview...
NIST has published Special Publication (SP) 800-188, De-Identifying Government Datasets: Techniques and Governance. De-identification removes identifying...
NIST has released the third public draft of NIST Special Publication (SP) 800-188, De-Identifying Government Data Sets, for public comment. De-identification...
Get to know NIST’s bug killer, versed in multiple languages of the digital world and ready to tackle programming’s pests. In 1971, Paul E. Black took a class...
Behind the scenes at your doctor’s office, there’s a complicated set of information that your providers have to absorb before telling you which vaccinations to...
A shoddily tailored suit or a shrunken T-shirt may not be the most stylish, but wearing them is unlikely to hurt more than your reputation. An ill-fitting...
In efforts to automatically capture important data from scientific papers, computer scientists at the National Institute of Standards and Technology (NIST) have...
Digital forensics experts often extract data from computers and mobile phones that may contain evidence of a crime. Now, researchers at the National Institute...
Criminals sometimes damage their mobile phones in an attempt to destroy evidence. They might smash, shoot, submerge or cook their phones, but forensics experts...
One of the largest software libraries in the world just grew larger. The National Software Reference Library (NSRL), which archives copies of the world’s most...
NIST has released Draft Special Publication (SP) 800-163 Revision 1, which updates a process for vetting mobile applications. This process can be used to ensure...
Aerial drones might someday deliver online purchases to your home. But in some prisons, drone delivery is already a thing. Drones have been spotted flying drugs...
NIST has published Special Publication (SP) 800-202, Quick Start Guide for Populating Mobile Test Devices which is meant to be used with Federated Testing, an...
The U.S. Centers for Disease Control and Prevention’s National Center for Health Statistics (NCHS) recently released the HL7 Version 2.6 Implementation Guide...
Researchers who work with stem cells have ambitious goals. Some want to cure cancer or treat heart disease. Others want to grow the tissues and organs that...
Data found on a suspect’s computer, cell phone or tablet can prove to be crucial evidence in a legal case. A new set of software tools developed at the National...
A group of computer scientists at the National Institute of Standards and Technology (NIST) has been working for more than 15 years on an impossible task: to...
We can create software with 100 times fewer vulnerabilities than we do today, according to computer scientists at the National Institute of Standards and...
Starting in the mid-1980s, a young man named Stephen Cabrinety filled his home with video games and software. He piled unopened boxes to the ceilings—everything...
The Election Assistance Commission (EAC) and the National Institute of Standards and Technology (NIST) are sponsoring a two-day symposium to explore emerging...