An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
On Sept. 26, 2006, the National Institute of Standards and Technology (NIST) released three draft information technology security publications for public
TV shows such as "CSI: Crime Scene Investigation" have popularized the role of forensic science in solving crimes. Now, computer security experts at the
Before ditching or donating that used computer, CD or other data-storage media, sensitive or personal information should be properly "sanitized," according to a
Americans are living longer than ever. As the senior population grows over the coming years, increasing the quality of healthcare while reducing costs will
The National Institute of Standards and Technology (NIST) is requesting comments on a draft revision of Recommended Security Controls for Federal Information
On July 19, National Institute of Standards and Technology (NIST) Director Bill Jeffrey testified before the House Committee on Science and the Committee on
The National Institute of Standards and Technology is requesting comments on a new draft guide that is intended to help organizations make wireless local area
The Association for Federal Information Resources Management (AFFIRM) recently awarded a team of NIST employees the Leadership in Service to the Government IT
Researchers at the National Institute of Standards and Technology (NIST) recently added 150 new methods—nicknamed "recipes"—to a database already containing 255
A study by the National Institute of Standards and Technology (NIST) shows that computerized systems that match fingerprints using interoperable minutiae
WASHINGTON, D.C.—Commerce Secretary Carlos Gutierrez today announced a new standard to help federal agencies improve their information technology security and
Technology in today's fast-moving telecommunications industry is all about convergence. The "next big thing" are the so-called Next Generation Networks (NGN)
The National Institute of Standards and Technology (NIST) yesterday issued the final publication describing how biometrics should be stored on Personal Identity
In an increasingly open environment of interconnected computer systems and networks, security is essential to ensure that information remains confidential, is
Dr. Virgil Gligor, one of the country's pioneering figures in computer security, will be presented with the 2006 National Information Systems Security Award by
Information technology has made it simpler and more convenient to handle a myriad of tasks online, such as booking a hotel, paying bills and ordering clothes
Today, federal agencies use computer systems and networks to store information and to interact with industry, private citizens and other governments both in
The National Institute of Standards and Technology (NIST) and Enterprise Integration Inc. (EII) are sponsoring a conference on how computer programs for
The National Institute of Standards and Technology would like comments on proposed changes to a Federal Information Processing Standard (FIPS) issued in
Ask any handyman what's the most important thing he needs to get the job done and he'll probably say his toolbox. Thanks to the National Institute of Standards
The Biometrics Consortium Conference 2005 will address the latest trends in research, development, testing and application of biometric technologies, especially
Widespread electronic attacks on computer systems have become commonplace with threats ranging from remotely launched attacks on network services to malicious
Handheld devices such as personal digital assistants are becoming indispensable tools for today's highly mobile workforce. Small and relatively inexpensive
Physicists at the National Institute of Standards and Technology (NIST) have used charged atoms (ions) to demonstrate a quantum physics version of computer
Cyber attackers are constantly scanning the Internet looking for vulnerabilities in computer systems that will enable them to take control and use the systems