An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST has released NIST BGP RPKI IO (BRIO) - an open-source test tool and data sets to facilitate testing and experimentation with emerging Border Gateway...
In recent years, numerous Internet routing incidents — such as Border Gateway Protocol (BGP) prefix hijacking, and route leaks — have resulted in denial of...
CTL staff Scott Rose, Oliver Borchert, and Doug Montgomery participated in the first joint O-RAN / 3GPP workshop on the standardization of zero trust...
Doug Montgomery (CTL/ Internet Technologies Research Group) participated t in the NSF Workshop on Policy-Relevant Internet Measurement at Georgia Tech...
NIST's Wireless Networks Division , in collaboration with the National Cybersecurity Center of Excellence , hosted an interim meeting of the O-RAN Alliance's...
NIST researcher CheeYee Tang, with MITRE staff, have started a project to address the cybersecurity needs for water and wastewater utilities. Through...
NIST researchers Timothy Zimmerman, Michael Pease, and Michael Powell, with MITRE staff, hosted a webinar with over 100 participants regarding their project...
The impact of cybersecurity breaches on infrastructure control system owners/operators is more significant and visible than ever before. Whether you work for an...
Previously, NIST researchers developed a model for predicting the minimum investment needed to achieve the optimum cybersecurity for large networks. Basically...
NIST has published Special Publication (SP) 800-215, Guide to a Secure Enterprise Network Landscape. Access to multiple cloud services (e.g., IaaS, SaaS), the...
NIST has released a major revision to Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy Secure Systems. This final publication offers...
The enterprise network landscape has undergone a significant transformation in the last decade. The drivers for this transformation are enterprise access to...
In the Internet, laser light is used to carry signals to intended destinations. Such optical communications enabled the establishment of the global Internet and...
The potential of quantum communications lies in the phenomena called "entanglement." It involves entangling two or more subatomic particles, like photons, which...
NIST is releasing the final public draft of a major revision to Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy Secure Systems. This final...
NIST has released its public draft of NIST Special Publication (SP) 800-82r3, Guide to Operational Technology (OT) Security. This is the third revision of NIST...
As wireless networks transition to 5G technology, they could enable a host of new capabilities — but they also will place new cybersecurity demands on industry.
Manufacturing supply chains are increasingly susceptible to disruptions and are targets for bad actors seeking to steal proprietary information and/or sabotage...
NIST is releasing the draft of a major revision to Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy Secure Systems. This publication is...
NIST has released a new version of its measurement tools aimed at improving trust and confidence in emerging technologies for improving the security and...