An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Meet Shanée Dawkins, a computer scientist whose expertise in the way people interact with technology extends in multiple directions, from phishing to public...
Today, NIST is publishing Federal Information Processing Standard (FIPS) 186-5, Digital Signature Standard (DSS), along with NIST Special Publication (SP) 800...
Previously, NIST researchers developed a model for predicting the minimum investment needed to achieve the optimum cybersecurity for large networks. Basically...
NIST requests public comments on NIST IR 8214C ipd (initial public draft), NIST First Call for Multi-Party Threshold Schemes, for primitives organized into two...
Despite Slowing Economy, Demand for Cybersecurity Workers Remains Strong Today during the Federal Cybersecurity Workforce Webinar on Providing Timely and Clear...
NIST is announcing the initial public drafts of NIST SP 800-157r1 (Revision 1), Guidelines for Derived Personal Identity Verification (PIV) Credentials, and...
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines. Currently, we are reviewing the following publication...
NIST recognizes the importance of the infrastructure that provides positioning, timing, and navigation (PNT) information to the scientific knowledge, economy...
As a part of the periodic review of NIST’s cryptographic standards and guidelines, NIST's Crypto Publication Review Board ("Review Board") announced the review...
The rapid proliferation of online services over the past few years has heightened the need for reliable, equitable, secure, and privacy-protective digital...
NIST is introducing a plan to transition away from the current limited use of the Secure Hash Algorithm 1 (SHA-1) hash function. Other approved hash functions...
In January 2022, NIST's Crypto Publication Review Board initiated a review process for NIST Special Publication (SP) 800-106, Randomized Hashing for Digital...
As a part of the periodic review of NIST’s cryptographic standards and guidelines, NIST's Crypto Publication Review Board announced the review of Federal...
The NICE K12 Cybersecurity Education Conference took place this week in St. Louis, Missouri. The conference brought together over 400 participants and featured...
NIST is seeking public comments on two draft NIST Internal Reports (NIST IR) for the National Online Informative References (OLIR) Program. This Program is a...
The Cybersecurity Apprenticeship Sprint , a national campaign to promote Registered Apprenticeships to develop the cybersecurity workforce, ended this week...
Business impact analyses (BIAs) have been traditionally used for business continuity and disaster recovery (BC/DR) planning to understand the potential impacts...
NIST has published Special Publication (SP) 800-215, Guide to a Secure Enterprise Network Landscape. Access to multiple cloud services (e.g., IaaS, SaaS), the...
NIST has released a major revision to Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy Secure Systems. This final publication offers...
NIST has released the third public draft of NIST Special Publication (SP) 800-188, De-Identifying Government Data Sets, for public comment. De-identification...
NIST has published NIST Internal Report (IR) 8409, Measuring the Common Vulnerability Scoring System Base Score Equation. Calculating the severity of...
Summary NIST has released a working draft of NIST Special Publication (SP) 800-55 Revision 2, Performance Measurement Guide for Information Security. The public...