An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In today’s computing environment, the security of all computing resources, from network infrastructure devices to users’ desktop and laptop computers, is
Pursuant to the Federal Advisory Committee Act, as amended, 5 U.S.C. App., notice is hereby given that the ISPAB will meet Thursday, November 01, 2018, from 9
The Internet of Things (IoT) has exciting new potential to improve human life, but can you trust it? IoT refers to systems that connect humans, non-human
Transport Layer Security (TLS) provides mechanisms for protecting data during electronic dissemination across the Internet. Draft NIST Special Publication (SP)
NIST announces the publication of NISTIR 8202, Blockchain Technology Overview, a high-level technical publication that examines the history, scope, and
After performing an internal review of some of its older publications, NIST’s Computer Security Division has decided to withdraw three (3) SP 800 publications
NIST announces the final public draft Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations--A System Life
11/14/2018: Comment Period Extension: Comments are now due by December 21, 2018. Since the release of Federal Information Processing Standard (FIPS) 39 in 1976
Privileged accounts provide elevated, often unrestricted access to an organization's underlying information systems and technology, making them rich targets for
On September 20th Vincent Hu published new version of Access Control Policy Tool (ACPT), ACPT allows a user to compose, verify, test, and generate access
Hardware/server virtualization is now integral to the infrastructure of data centers used for cloud computing services and enterprise computing. However, the
NIST has released Draft NIST Internal Report (NISTIR) 8222, Internet of Things (IoT) Trust Concerns, which identifies seventeen technical trust-related issues
9/18/2018—Draft NISTIR 8222 has been temporarily withdrawn to synchronize with other pending documents on this topic, and to ensure time for stakeholders to
Financial institutions deploy a wide array of information technology devices, systems, and applications across a wide geographic area. While these physical
It is difficult to overstate the importance of the internet to modern business and to society in general. The internet is essential to the exchange of all
NIST has initiated a process to solicit, evaluate, and standardize lightweight cryptographic algorithms that are suitable for use in constrained environments
NIST announces the release of Draft NISTIR 8214 , Threshold Schemes for Cryptographic Primitives. This publication provides a high-level overview of the
NIST has released Draft Special Publication (SP) 800-163 Revision 1, which updates a process for vetting mobile applications. This process can be used to ensure
NIST is updating its guidance for transitioning to the use of stronger cryptographic keys and more robust algorithms by federal agencies to protect sensitive
NIST’s Computer Security Division has decided to withdraw eleven (11) SP 800 publications on August 1, 2018. These publications are out of date and will not be
Registration and a call for speakers are open for the 2018 NIST Cybersecurity Risk Management Conference, to be held November 7-9 in Baltimore, Maryland. The
Draft NIST Special Publication (SP) 800-71, Recommendations for Key Establishment Using Symmetric Block Ciphers, addresses key establishment techniques that use
NIST has published Special Publication (SP) 800-116 Revision 1, Guidelines for the Use of PIV Credentials in Facility Access. It provides best practice