An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) have announced a new cooperative agreement with the Internet Keep Safe...
The National Cybersecurity Center of Excellence (NCCoE) has released the final public draft of the NIST Cybersecurity Practice Guide, Draft SP 1800-15, Securing...
Today, NIST is publishing a new NIST Cybersecurity Practice Guide-- Special Publication (SP) 1800-21, Mobile Device Security: Corporate-Owned Personally-Enabled...
Hotels have become targets for malicious actors wishing to exfiltrate sensitive data, deliver malware, or profit from undetected fraud. Property management...
Volume A of the preliminary draft practice guide, Improving Enterprise Patching for General IT Systems, is available for public comment. The National...
NIST requests review and comments on Special Publication (SP) 800-46 Revision 2, Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD)...
GAITHERSBURG, Md.—The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) has made three awards for approximately $225,000 to...
A Draft NIST Cybersecurity White Paper, Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management, is now available for public...
By shining white light on a glass slide stippled with millions of tiny titanium dioxide pillars, researchers at the National Institute of Standards and...
As global temperatures continue to rise, cities and towns not historically prone to large wildfires may begin to face greater threats. An unsuspecting Tennessee...
The Federal Labs Consortium (FLC) was formally chartered by the Federal Technology Transfer Act of 1986 in order to develop a community of technology transfer...
NIST announces the publication of NISTIR 8272, Impact Analysis Tool for Interdependent Cyber Supply Chain Risks. This document describes a tool developed to...
NIST announces the final publication of NISTIR 8006, NIST Cloud Computing Forensic Science Challenges, which defines and discusses a set of challenges related...
Nine U.S. organizations were recently selected to receive fall site visits, the final stage of the evaluation process for the 2020 Malcolm Baldrige National...
Just released is NIST Special Publication (SP) 800-211, 2019 NIST/ITL Cybersecurity Program Annual Report, which details the NIST Information Technology...
Genome editing is the manipulation of the genetic material of a living organism by deleting, replacing, or inserting a DNA sequence, typically with the aim of...
A shoddily tailored suit or a shrunken T-shirt may not be the most stylish, but wearing them is unlikely to hurt more than your reputation. An ill-fitting...
DNA is not only the blueprint of life; it has become the backbone for making tiny structures that can be inserted into the human body to diagnose and treat...
It’s a question that many of us encounter in childhood: “ Why did you do that?” As artificial intelligence (AI) begins making more consequential decisions that...
A new design for light-emitting diodes (LEDs) developed by a team including scientists at the National Institute of Standards and Technology (NIST) may hold the...
Many cities in the United States have experienced or will experience devastating losses caused by a natural disaster. In the aftermath of a disaster, the...
Researchers at the National Institute of Standards and Technology and Emory University have discovered that some bird species in the sub-Arctic tend to ingest...
We invite you to join us in observing National Cybersecurity Career Awareness Week November 9-14, 2020 2020 Call for Commitments - Open Now Read More The...
NIST announces the final publication of Special Publication (SP) 800-207, Zero Trust Architecture, which discusses the core logical components that make up a...