An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The Internet of Things (IoT) has exciting new potential to improve human life, but can you trust it? IoT refers to systems that connect humans, non-human...
Transport Layer Security (TLS) provides mechanisms for protecting data during electronic dissemination across the Internet. Draft NIST Special Publication (SP)...
After performing an internal review of some of its older publications, NIST’s Computer Security Division has decided to withdraw three (3) SP 800 publications...
NIST announces the publication of NISTIR 8202, Blockchain Technology Overview, a high-level technical publication that examines the history, scope, and...
NIST announces the final public draft Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations--A System Life...
11/14/2018: Comment Period Extension: Comments are now due by December 21, 2018. Since the release of Federal Information Processing Standard (FIPS) 39 in 1976...
Privileged accounts provide elevated, often unrestricted access to an organization's underlying information systems and technology, making them rich targets for...
On September 20th Vincent Hu published new version of Access Control Policy Tool (ACPT), ACPT allows a user to compose, verify, test, and generate access...
Hardware/server virtualization is now integral to the infrastructure of data centers used for cloud computing services and enterprise computing. However, the...
NIST has released Draft NIST Internal Report (NISTIR) 8222, Internet of Things (IoT) Trust Concerns, which identifies seventeen technical trust-related issues...
9/18/2018—Draft NISTIR 8222 has been temporarily withdrawn to synchronize with other pending documents on this topic, and to ensure time for stakeholders to...
Financial institutions deploy a wide array of information technology devices, systems, and applications across a wide geographic area. While these physical...
It is difficult to overstate the importance of the internet to modern business and to society in general. The internet is essential to the exchange of all...
NIST has initiated a process to solicit, evaluate, and standardize lightweight cryptographic algorithms that are suitable for use in constrained environments...
NIST announces the release of Draft NISTIR 8214 , Threshold Schemes for Cryptographic Primitives. This publication provides a high-level overview of the...
NIST has released Draft Special Publication (SP) 800-163 Revision 1, which updates a process for vetting mobile applications. This process can be used to ensure...
NIST is updating its guidance for transitioning to the use of stronger cryptographic keys and more robust algorithms by federal agencies to protect sensitive...
NIST’s Computer Security Division has decided to withdraw eleven (11) SP 800 publications on August 1, 2018. These publications are out of date and will not be...
Registration and a call for speakers are open for the 2018 NIST Cybersecurity Risk Management Conference, to be held November 7-9 in Baltimore, Maryland. The...
NIST seeks comments on Draft Special Publication (SP) 800-56B Revision 2, Recommendation for Pair-Wise Key-Establishment Using Integer Factorization...
Draft NIST Special Publication (SP) 800-71, Recommendations for Key Establishment Using Symmetric Block Ciphers, addresses key establishment techniques that use...
NIST has published Special Publication (SP) 800-116 Revision 1, Guidelines for the Use of PIV Credentials in Facility Access. It provides best practice...
NIST is publishing Special Publication (SP) 800-171A, Assessing Security Requirements for Controlled Unclassified Information (CUI). It is intended to help...
NIST has published Special Publication 800-125A Revision 1, Security Recommendations for Server-based Hypervisor Platforms. The revision adds security...