An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Today marks the kick off of the inaugural US Cyber Games™ led by Katzcy, in cooperation with the National Initiative for Cybersecurity Education (NICE) program...
The Technology Partnerships Office (TPO) at NIST wanted to take an in-depth, analytical look into the geographic distribution of active NIST cooperative...
The National Oceanic and Atmospheric Administration (NOAA) and the National Institute of Standards and Technology (NIST) have installed a Doppler lidar...
The crystal known as perovskite is a promising photovoltaic material for harnessing energy from sunlight. Perovskites have several advantages over silicon, the...
Digital twin technology is an emerging area of research and standardization. Because of this, there may be a lack of clarity as to what is new with digital...
If you have a fear of needles, getting a urine test is a pain-free way for doctors to screen for kidney disease or any signs of kidney damage. Clinicians...
The Nuclear Regulatory Commission (NRC) has released its interim special inspection report on the Feb. 3, 2021, event at the NIST Center for Neutron Research...
We Want to Hear from You! The public comment period for draft NISTIR 8355, NICE Framework Competencies: Assessing Learners for Cybersecurity Work , and the...
CALL FOR PROPOSALS is open now through June 18 “Broadening the Path to Cybersecurity Careers Through K12 Education” We encourage proposals from a diverse array...
Engineers at the National Institute of Standards and Technology (NIST) have built a low-cost computer system that connects older public safety radios with the...
In high-end 21 st century communications, information travels in the form of a stream of light pulses typically traveling through fiber optic cables. Each pulse...
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Automation of the Cryptographic Module Validation Program...
Dr. Marla Dowell joined Colorado Labs and U.S. Representative Ed Perlmutter for a discussion on aerospace-related digital communications technology research at...
On January 29, 2021, the Center for Urban and Regional Studies (CURS) at The University of North Carolina at Chapel Hill announced a new report, Gearing Up: MEP...
Dayna Blanchard, a longtime leader with nearly two decades of experience with the MEP Center, has been named as the next director of the Manufacturing Extension...
Electron or X-Ray Beam Lithography in Liquids Description These days, the fabrication of 2D and 3D structures out of liquid, biocompatible, hydrogel solutions...
Researchers at the National Institute of Standards and Technology (NIST) and collaborators have demonstrated an atom-based sensor that can determine the...
The U.S Commerce Department’s National Institute of Standards and Technology (NIST) Manufacturing Extension Partnership (MEP) has made one cooperative agreement...
The National Institute of Standards and Technology (NIST) plans to award funding for cooperative agreements for curricula development that will educate students...
Information security continuous monitoring (ISCM) programs provide an understanding of risk tolerance and help officials set priorities and consistently manage...
After the optical frequency comb made its debut as a ruler for light, spinoffs followed, including the astrocomb to measure starlight and a radar-like comb...
In recent years criminals and other attackers have compromised the networks of several major hospitality companies, exposing the information of hundreds of...
A new practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable...
Making elections secure means protecting against ever-evolving threats to information technology — which scans in-person and mail-in ballots, supports voter...
When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part of...