An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are...
The protection of controlled unclassified information (CUI) in nonfederal systems and organizations—especially CUI associated with a critical program or high...
Digital twin technology is an emerging area of research and standardization. Because of this, there may be a lack of clarity as to what is new with digital...
Information security continuous monitoring (ISCM) programs provide an understanding of risk tolerance and help officials set priorities and consistently manage...
NIST has completed the review of the second-round candidates in NIST's lightweight cryptography standardization process. After careful consideration, the ten...
When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part of...
NIST announces the release of Draft NIST Internal Report (NISTIR) 8360, Machine Learning for Access Control Policy Verification. Access control policy...
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, the National Institute of...
NIST announces the release of NISTIR 8276 , Key Practices in Cyber Supply Chain Risk Management (C-SCRM): Observations from Industry. This final document...
Traditional data and operations management across organizations and on the web can involve inefficient transaction reconciliation between siloed databases...
NIST announces the release of Draft NISTIR 8344, Ontology for Authentication, for public comment. This draft document is the result of an effort to define...
Also see NIST Offers Tools to Help Defend Against State-Sponsored Hackers NIST Special Publication (SP) 800-172 provides federal agencies with a set of enhanced...
Nations around the world are adding cyberwarfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries...
Deployment architecture in cloud-native applications now consists of loosely coupled components (microservices), with all application services provided through...
Organizations frequently share information through various information exchange channels based on mission and business needs. In order to protect the...
New and updated supplemental materials for NIST Special Publication (SP) 800-53, Revision 5, Security and Privacy Controls for Information Systems and...
New supplemental materials for NIST Special Publication (SP) 800-53 Revision 5, Security and Privacy Controls for Information Systems and Organizations, are...
NIST requests comments on Draft Federal Information Processing Standard (FIPS) 201-3, Personal Identity Verification (PIV) of Federal Employees and Contractors...
NIST Special Publication (SP) 800-53B, Control Baselines for Information Systems and Organizations, provides security and privacy control baselines for the...
If you’ve ever tried to set up a home entertainment system by poring over a thick manual, you might appreciate the manufacturer also providing you with a quick...
NIST announces the release of Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes . This publication supplements FIPS 186...
Storage infrastructure—along with compute (encompassing OS and host hardware) and network infrastructures—is one of the three fundamental pillars of Information...
Today, NIST is publishing NIST Technical Note (TN) 2111, An Empirical Study on Flow-based Botnet Attacks Prediction. In the era of the Internet of Things...
Draft NIST Interagency Report (NISTIR) 8212, ISCMA: An Information Security Continuous Monitoring Program Assessment, provides an operational approach to the...