An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
A new publication released by the National Institute of Standards and Technology (NIST) on June 30 can help information system managers negotiate the often...
The National Institute of Standards and Technology (NIST) has developed two demonstration software packages that show how Personal Identity Verification (PIV)...
In recent years cell phones and PDAs—"Personal Digital Assistants"—have exploded in power, performance and features. They now often boast expanded memory...
The National Institute of Standards and Technology (NIST) has released the second public draft of NIST Special Publication 800-39, Managing Risk from...
Federal agencies have begun issuing a secure form of government-wide ID known as the Personal Identity Verification (PIV) card, mandated in 2004 by Homeland...
A fingerprint identification technology for use in Personal Identification Verification (PIV) cards that offers improved protection from identity theft meets...
A new Web site launched by the National Institute of Standards and Technology (NIST) can help federal information systems managers maintain the security of...
As this year's holiday season approaches, your credit card transactions may be a little more secure thanks to standards adopted by the payment card industry...
The National Institute of Standards and Technology (NIST) has opened a competition to develop a new cryptographic "hash" algorithm, a tool that converts a file...
Widely recognized as the engine that drives the U.S. economy, information technology enables the vast majority of organizations to carry out their missions and...
The National Institute of Standards and Technology (NIST) has released a new publication that provides detailed tips on how to make web servers more resistant...
Many Web-based services, from shopping to online word processing, allow computer programs to talk to each other and exchange user data across several Web sites...
The National Institute of Standards and Technology (NIST) recently released an improved version of its Personal Identity Verification (PIV) Data Generator, a...
The National Institute of Standards and Technology (NIST) is making available "virtual machine images" of secure configurations of the Microsoft Windows XP and...
The National Institute of Standards and Technology (NIST) has released three draft Special Publications (SP) documents for public comment. Revision 1, Wireless...
Electricity, power, water, communications, waste treatment—we call the facilities that supply these services our "critical" infrastructures because they truly...
Providing strong security for complex federal information systems is a challenging job. But now there's a new version of a draft guide for assessing the...
The National Institute of Standards and Technology (NIST) has issued a revised version of Recommended Security Controls for Federal Information Systems (NIST...
Steven M. Bellovin, a pioneer researcher on network security, will be presented with the 2007 National Information Systems Security Award by the National...
Heads of federal agencies, chief information officers and any manager who needs a broad overview on information security practices will be interested in a new...
Established just a little over a year ago, the National Institute of Standards and Technology's (NIST) National Vulnerability Database (NVD) now contains...
The National Institute of Standards and Technology recently issued four publications to provide computer security advice on issues ranging from securing Windows...
On Sept. 26, 2006, the National Institute of Standards and Technology (NIST) released three draft information technology security publications for public...
TV shows such as "CSI: Crime Scene Investigation" have popularized the role of forensic science in solving crimes. Now, computer security experts at the...
Before ditching or donating that used computer, CD or other data-storage media, sensitive or personal information should be properly "sanitized," according to a...