An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Summary A Federal Register Notice (FRN) announces a Request for Comments on Draft FIPS 186-5 and Draft NIST Special Publication (SP) 800-186. NIST seeks...
NIST's National Cybersecurity Center of Excellence (NCCoE) has released Draft NISTIR 8269, A Taxonomy and Terminology of Adversarial Machine Learning, for...
In recent years, numerous routing control plane anomalies such as Border Gateway Protocol (BGP), prefix hijacking, and route leaks have resulted in denial of...
NIST announces an update of Special Publication (SP) 800-128 , Guide for Security-Focused Configuration Management of Information Systems, which provides...
Summary
NIST has released the following Draft NIST Special Publications (the SP 800-140x “subseries”) for public comment. They directly support Federal...
NIST invites comments on Draft Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General.
This document provides...
NIST announces the publication of NIST Internal Report (IR) 8268, Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process...
Consumer IoT products are rapidly growing in popularity because these devices can make basic tasks, like adjusting the thermostat or turning on exterior home...
An Implementation Guide for the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level has been developed for manufacturers managing cybersecurity...
NIST invites comments on Draft Special Publication (SP) 800-207, Zero Trust Architecture, which discusses the core logical components that make up a zero trust...
The National Cybersecurity Center of Excellence (NCCoE) has released Draft NIST Special Publication (SP) 1800-23, Energy Sector Asset Management, for public...
The National Cybersecurity Center of Excellence (NCCoE) has released Draft NIST Special Publication (SP) 1800-24, Securing Picture Archiving and Communication...
NIST seeks comments on the Preliminary Draft of the NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (“Preliminary Draft”...
The goal of the NIST Systems Security Engineering initiative is to address security, safety, and resiliency issues from a stakeholder requirements and...
NIST would like to announce the 32 candidates that will be moving on to the 2nd round of the NIST LWC Standardization Process. The second-round candidates of...
Given the nature of interconnected networks and the use of the internet to share information, the protection of sensitive data can become difficult if proper...
The National Cybersecurity Center of Excellence (NCCoE) has published the final version of NIST Cybersecurity Practice Guide SP 1800-7, Situational Awareness...
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise...
As manufacturers create an incredible and ever-growing variety of Internet of Things (IoT) devices, they should also understand the cybersecurity risks...
As retailers in the United States have adopted chip-and-signature and chip-and-PIN (personal identification number) point-of-sale security measures, there have...
Cryptography relies upon two basic components—an algorithm and a cryptographic key—to protect data in an information technology security environment. Such data...
The National Cybersecurity Center of Excellence (NCCoE) has released Draft NIST Special Publication (SP) 1800-21, Mobile Device Security: Corporate-Owned...
This NIST Cybersecurity Practice Guide— Draft SP 1800-16, Securing Web Transactions: Transport Layer Security (TLS) Server Certificate Management—shows large...
Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results...
Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security...