An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results
Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security
Internet Protocol Security (IPsec) is a network layer security control used to protect communications over public networks, encrypt IP traffic between hosts
It is difficult to overstate the importance of the internet to modern business and to society in general. The internet is essential to the exchange of all
Summary
The National Cybersecurity Center of Excellence (NCCoE) is announcing the release of two new data confidentiality draft project descriptions. We are
NIST is pleased to announce the first official release of the Open Security Controls Assessment Language ( OSCAL), Version 1.0.0 - Milestone 1. The release
Summary
NIST is seeking comments on Draft NIST Special Publication (SP) 800-171 Revision 2, Protecting Controlled Unclassified Information in Nonfederal
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control
The National Cybersecurity Center of Excellence (NCCoE) has posted two draft Project Descriptions for public comment:
Detecting and Protecting Against Data
NIST is releasing a Draft NIST Cybersecurity White Paper for public comment, Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software
NIST is releasing a Draft NIST Cybersecurity White Paper for public comment, Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software
Hardware/Server Virtualization is a foundational technology in a cloud computing environment and the hypervisor is the key software in that virtualized
NIST Special Publication (SP) 800-64 Revision 2, Security Considerations in the System Development Life Cycle (October 2008), has been withdrawn. It includes
The National Cybersecurity Center of Excellence (NCCoE) at NIST is seeking comments on a revised draft of the practice guide NIST SP 1800-13, Mobile Application
A draft implementation guide ( NISTIR 8183A) for the Cybersecurity Framework (CSF) Manufacturing Profile Low Security Level has been developed for managing
Cryptographic mechanisms are often used to protect the integrity, authenticity, and confidentiality of sensitive and high value data that is vulnerable to
A draft white paper is now available for comment, An Application of Combinatorial Methods for Explainability in Artificial Intelligence and Machine Learning.
On March 22, 2019, the Secretary of Commerce approved Federal Information Processing Standard (FIPS) 140-3, Security Requirements for Cryptographic Modules.
The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary draft practice guide, SP 1800-15, Securing Small-Business and Home Internet
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the
NIST Special Publication (SP) 800-163 Revision 1, Vetting the Security of Mobile Applications, is an important update to NIST guidance on mobile application