An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Information security continuous monitoring (ISCM) programs provide an understanding of risk tolerance and help officials set priorities and consistently manage
NIST has completed the review of the second-round candidates in NIST's lightweight cryptography standardization process. After careful consideration, the ten
When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part of
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, the National Institute of
NIST announces the release of NISTIR 8276 , Key Practices in Cyber Supply Chain Risk Management (C-SCRM): Observations from Industry. This final document
Traditional data and operations management across organizations and on the web can involve inefficient transaction reconciliation between siloed databases
NIST announces the release of Draft NISTIR 8344, Ontology for Authentication, for public comment. This draft document is the result of an effort to define
Also see NIST Offers Tools to Help Defend Against State-Sponsored Hackers NIST Special Publication (SP) 800-172 provides federal agencies with a set of enhanced
Nations around the world are adding cyberwarfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries
Deployment architecture in cloud-native applications now consists of loosely coupled components (microservices), with all application services provided through
New supplemental materials for NIST Special Publication (SP) 800-53 Revision 5, Security and Privacy Controls for Information Systems and Organizations, are
NIST requests comments on Draft Federal Information Processing Standard (FIPS) 201-3, Personal Identity Verification (PIV) of Federal Employees and Contractors
NIST Special Publication (SP) 800-53B, Control Baselines for Information Systems and Organizations, provides security and privacy control baselines for the
If you’ve ever tried to set up a home entertainment system by poring over a thick manual, you might appreciate the manufacturer also providing you with a quick
NIST announces the release of Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes . This publication supplements FIPS 186
Storage infrastructure—along with compute (encompassing OS and host hardware) and network infrastructures—is one of the three fundamental pillars of Information
Today, NIST is publishing NIST Technical Note (TN) 2111, An Empirical Study on Flow-based Botnet Attacks Prediction. In the era of the Internet of Things
Draft NIST Interagency Report (NISTIR) 8212, ISCMA: An Information Security Continuous Monitoring Program Assessment, provides an operational approach to the
Traditional data and operations management across organizations and on the web can involve inefficient transaction reconciliation between siloed databases
NIST is planning to update NIST Special Publication (SP) 800-55 Revision 1, Performance Measurement Guide for Information Security. For more details on an
NIST Special Publication (SP) 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations, represents a multi-year effort to