An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
U.S. Government concerns about the cybersecurity of electric vehicle supply equipment (EVSE) infrastructure cover a range of issues. What impact would EVSE have...
NIST requests comments on the Draft Cybersecurity White Paper, Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security...
When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable...
NIST requests comments on Draft Special Publication (SP) 800-210, General Access Control Guidance for Cloud Systems, which presents an initial step toward...
Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security...
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which...
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which...
NIST Special Publications (SP) 800-140 and -140A through -140F are now available. With the completion of these documents, the Cryptographic Module Validation...
As millions of Americans transition from an office environment to their homes to continue to work, maintaining cybersecurity while teleworking is imperative...
There is an urgent need to strengthen the trustworthiness and resilience of the information systems, component products, and services that we depend on in every...
After your organization forms a general plan for tackling its cybersecurity and privacy risk management issues, it needs particular state-of-the-art tools to...
NIST requests comments on Draft NISTIR 8272, Impact Analysis Tool for Interdependent Cyber Supply Chain Risks, which describes a prototype tool developed to...
NIST requests your comments on Draft SP 800-133 Revision 2, Recommendation for Cryptographic Key Generation , which discusses the generation of the keys to be...
NIST Special Publication 800-171, Revision 2, Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations, has been approved as...
The number of Common Vulnerabilities and Exposures identifiers (CVE IDs) created year over year has rapidly increased, and this trend is expected to continue...
NIST requests feedback on Draft NISTIR 8276, Key Practices in Cyber Supply Chain Risk Management: Observations from industry. This publication is based on an...
Since NIST Special Publication (SP) 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations, was published in 2015...
Reducing the cybersecurity risk to one of the most vulnerable aspects of commerce — global supply chains — is the goal of a new publication by the National...
As microservices-based applications are increasingly adopted within large enterprises and cloud-based environments, there is a need for a dedicated, scalable...
Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results...
Federal agencies, under the Federal Information Security Modernization Act of 2014 (FISMA) and Office of Management and Budget (OMB) circulars and memoranda...
NIST invites comments on Draft NIST Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. All of the digital signature...
The United States continues to have complete dependence on information technology deployed in critical systems and applications in both the public and private...
When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable...
NIST invites comments on Draft NISTIR 8214A , Towards NIST Standards for Threshold Schemes for Cryptographic Primitives: A Preliminary Roadmap, which presents a...