An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Fault detection often depends on the specific order of inputs that establish states which eventually lead to a failure. However, beyond basic structural
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines. This announcement initiates the review of Federal
Traditional business impact analyses (BIAs) have been successfully used for business continuity and disaster recovery (BC/DR) by triaging damaged infrastructure
Today, NIST is seeking public comments on NIST IR 8409 ipd (initial public draft), Measuring the Common Vulnerability Scoring System Base Score Equation
NIST is releasing the final public draft of a major revision to Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy Secure Systems. This final
Cybersecurity Hiring Momentum Ramps Up, New Data from CyberSeek™ Reveals Today at the at the NICE Conference & Expo in Atlanta, Georgia, Rodney Petersen
The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE) has published Volume A of a preliminary draft practice
NIST has published NIST Internal Report (NIST IR) 8403, Blockchain for Access Control Systems. Protecting system resources against unauthorized access is the
NIST has published revisions of two Special Publications (SP) that identify security functions and sensitive security parameter generation and establishment
NIST has released a revision of Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations ( NIST Special Publication 800-161 Revision 1
A new update to the National Institute of Standards and Technology’s foundational cybersecurity supply chain risk management (C-SCRM) guidance aims to help
NIST has released the initial public draft of NIST Special Publication (SP) 800-82r3, Guide to Operational Technology (OT) Security, which provides guidance on
NIST has released its public draft of NIST Special Publication (SP) 800-82r3, Guide to Operational Technology (OT) Security. This is the third revision of NIST
As wireless networks transition to 5G technology, they could enable a host of new capabilities — but they also will place new cybersecurity demands on industry.
The National Cybersecurity Center of Excellence (NCCoE) has released a new preliminary draft publication, Special Publication (SP) 1800-33 Volume B, 5G
Are you interested in helping to energize, promote, and coordinate a robust community working together to advance an integrated ecosystem of cybersecurity
Manufacturing supply chains are increasingly susceptible to disruptions and are targets for bad actors seeking to steal proprietary information and/or sabotage
The National Cybersecurity Center of Excellence (NCCoE) announces the release of three related publications on trusted cloud and hardware-enabled security. The
In August 2021, NIST's Crypto Publication Review Board initiated a review process for NIST Special Publication (SP) 800-22 Rev. 1a, A Statistical Test Suite for
NIST recognizes the importance of the infrastructure that provides positioning, timing, and navigation (PNT) information to the scientific knowledge, economy
Share evidence of your effective practices and solutions at the 2022 NICE K12 Cybersecurity Education Conference The 2022 NICE K12 Cybersecurity Education
NIST has published NIST Internal Report (NISTIR) 8419, B lockchain and Related Technologies to Support Manufacturing Supply Chain Traceability: Needs and
The National Cybersecurity Center of Excellence (NCCoE) has released two new final publications on enterprise patch management. Patching is a critical component
In May 2021, NIST initiated a review process for several publications, including the Special Publication (SP) 800-38A, Recommendation for Block Cipher Modes of