An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST has completed the initial check of all algorithm submission packages received in response to the August 27, 2018 Request for Nominations for Lightweight
Cybersecurity and usability must coexist. Systems that prioritize usability over a strong security posture may fall prey to increasingly sophisticated cyber
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process
Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission
NIST announces the publication of NIST Internal Report (NISTIR) 8214, Threshold Schemes for Cryptographic Primitives. This publication provides a high-level
Summary
NIST requests public comments on Draft Special Publication 800-38G Revision 1, Recommendation for Block Cipher Modes of Operation: Methods for Format
The past forty years have seen both the worldwide adoption of email and the simultaneous rise of Internet-based crimes and threats. While the Internet’s
NIST Special Publication 800-162, Guide to Attribute Based Access Control (ABAC) Definition and Considerations, has been updated with minor editorial changes
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control
After over a year of evaluation, NIST would like to announce the candidates that will be moving on to the 2nd round of the NIST PQC Standardization Process.
The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our
Today, NIST is publishing NIST Special Publication (SP) 800-37 Revision 2 , Risk Management Framework for Information Systems and Organizations: A System Life
In recent years, numerous routing control plane anomalies such as Border Gateway Protocol (BGP), prefix hijacking, and route leaks have resulted in Denial of
NIST has published NIST Interagency Report (NISTIR) 8011 Volume 3, Automation Support for Security Control Assessments: Software Asset Management.
This
The National Cybersecurity Center of Excellence (NCCoE) has released preliminary drafts for Volume A (Executive Summary) and Volume B ( Approach, Architecture
The Interagency International Cybersecurity Standardization Working Group (IICS WG), through its Internet of Things (IoT) Task Group, developed NIST Interagency
NIST has released a preliminary draft of NIST Special Publication (SP) 1800-19B, Trusted Cloud: Security Practice Guide for VMWare Hybrid Cloud Infrastructure
NIST invites public comments on this second draft of Special Publication (SP) 800-57 Part 2 Rev. 1, Recommendation for Key Management Part 2: Best Practices for
NIST invites public comments on a second draft of Special Publication (SP) 800-57 Part 2 Rev. 1, Recommendation for Key Management Part 2: Best Practices for
Comment Period Extended: Comments on Draft NISTIR 7298 Rev. 3 and the Online Glossary are now due by December 21, 2018 (the original due date was Nov. 30)
NIST invites comments on Draft Special Publication (SP) 800-179 Revision 1, Guide to Securing macOS 10.12 Systems for IT Professionals: A NIST Security