An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable
NIST invites comments on Draft NISTIR 8214A , Towards NIST Standards for Threshold Schemes for Cryptographic Primitives: A Preliminary Roadmap, which presents a
Summary A Federal Register Notice (FRN) announces a Request for Comments on Draft FIPS 186-5 and Draft NIST Special Publication (SP) 800-186. NIST seeks
NIST's National Cybersecurity Center of Excellence (NCCoE) has released Draft NISTIR 8269, A Taxonomy and Terminology of Adversarial Machine Learning, for
In recent years, numerous routing control plane anomalies such as Border Gateway Protocol (BGP), prefix hijacking, and route leaks have resulted in denial of
NIST announces an update of Special Publication (SP) 800-128 , Guide for Security-Focused Configuration Management of Information Systems, which provides
Summary
NIST has released the following Draft NIST Special Publications (the SP 800-140x “subseries”) for public comment. They directly support Federal
NIST invites comments on Draft Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General.
This document provides
NIST announces the publication of NIST Internal Report (IR) 8268, Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process
Consumer IoT products are rapidly growing in popularity because these devices can make basic tasks, like adjusting the thermostat or turning on exterior home
An Implementation Guide for the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level has been developed for manufacturers managing cybersecurity
The National Cybersecurity Center of Excellence (NCCoE) has released Draft NIST Special Publication (SP) 1800-23, Energy Sector Asset Management, for public
NIST invites comments on Draft Special Publication (SP) 800-207, Zero Trust Architecture, which discusses the core logical components that make up a zero trust
The National Cybersecurity Center of Excellence (NCCoE) has released Draft NIST Special Publication (SP) 1800-24, Securing Picture Archiving and Communication
NIST seeks comments on the Preliminary Draft of the NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (“Preliminary Draft”
NIST would like to announce the 32 candidates that will be moving on to the 2nd round of the NIST LWC Standardization Process. The second-round candidates of
Given the nature of interconnected networks and the use of the internet to share information, the protection of sensitive data can become difficult if proper
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise
The National Cybersecurity Center of Excellence (NCCoE) has published the final version of NIST Cybersecurity Practice Guide SP 1800-7, Situational Awareness
As manufacturers create an incredible and ever-growing variety of Internet of Things (IoT) devices, they should also understand the cybersecurity risks
As retailers in the United States have adopted chip-and-signature and chip-and-PIN (personal identification number) point-of-sale security measures, there have
Cryptography relies upon two basic components—an algorithm and a cryptographic key—to protect data in an information technology security environment. Such data
The National Cybersecurity Center of Excellence (NCCoE) has released Draft NIST Special Publication (SP) 1800-21, Mobile Device Security: Corporate-Owned
This NIST Cybersecurity Practice Guide— Draft SP 1800-16, Securing Web Transactions: Transport Layer Security (TLS) Server Certificate Management—shows large