An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The incredible advancements that have turned what were once standalone pieces of medical equipment into IoT devices do enable better care for patients, but at
The National Institute of Standards and Technology is seeking feedback regarding a draft practice guide for the use of trusted cybersecurity tools to conduct
Wirelessly connecting infusion pumps to point-of-care medication systems and EHRs improves healthcare delivery but also increases cybersecurity vulnerability
Additionally, many research projects depend on government-provided controlled unclassified information. Universities must comply with the standards of the
A representative with the U.S. Department of Commerce says there's a cybersecurity workforce shortage. The website, Cyberseek, says there are more than 2300
The National Institute of Standards and Technology awarded $4 million to 21 small businesses to help support “innovative development” in areas including
The program builds upon IoT security recommendations from the National Telecommunications and Information Administration (NTIA) and the National Institute of
Among the recommendations was a proposal to “stress test” what has become one of most reliable Federal policy standards for promoting better cybersecurity–the
Australia has the world’s longest single electricity grid, running more than 5000 kilometers from Port Douglas in Queensland to the bottom of Tasmania providing
As many as 35,000 cybersecurity-related annual job openings in California will need to be filled in the near future, a new research paper asserts, but “an
President Donald Trump has signed the NIST Small Business Cybersecurity Act into law requiring the National Institute of Standards and Technology to provide
NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems, provides instructions, recommendations, and considerations
Known vulnerability testing focuses on platform and dependency weaknesses. It involves testing software for vulnerabilities that have already been discovered in
Importantly, as Science magazine notes, the bill would authorize three agencies — the Energy Department, the National Institute of Standards and Technology and
The National Institute of Standards and Technology is working hard to get critical privacy controls worked into the next version of its risk management
Because of the level of the abundant risks due to vulnerabilities in multitudes of mobile communications apps, a 50-page draft app vetting process and guidance
Tali Ben-Aroya walked into a room at a technology company in the United States and realized that among the 30-odd entrepreneurs she was the only woman.
“From an employer perspective, we have to change the mindset of what makes somebody qualified to do the work,” Rodney Petersen, NICE director, told The Daily
The Workforce Management subgroup of the National Initiative for Cybersecurity Education (NICE) launched a project to draft guidelines for all members of an
Six years ago, during the first cybersecurity course offered at Baltimore’s Parkville High School, a student stumbled upon a mysterious section of the network.
" Rather than making hundreds of individual sample coins with various metal ratios, the team plugged in all the metallic variables into a computer program that