An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The National Institute of Standards and Technology is seeking feedback regarding a draft practice guide for the use of trusted cybersecurity tools to conduct...
Wirelessly connecting infusion pumps to point-of-care medication systems and EHRs improves healthcare delivery but also increases cybersecurity vulnerability...
Additionally, many research projects depend on government-provided controlled unclassified information. Universities must comply with the standards of the...
NIST's publication of U.S. population sequence data for 27 autosomal short tandem repeats may hasten the adoption of fast, inexpensive next-generation...
A representative with the U.S. Department of Commerce says there's a cybersecurity workforce shortage. The website, Cyberseek, says there are more than 2300...
The National Institute of Standards and Technology awarded $4 million to 21 small businesses to help support “innovative development” in areas including...
The program builds upon IoT security recommendations from the National Telecommunications and Information Administration (NTIA) and the National Institute of...
Among the recommendations was a proposal to “stress test” what has become one of most reliable Federal policy standards for promoting better cybersecurity–the...
Australia has the world’s longest single electricity grid, running more than 5000 kilometers from Port Douglas in Queensland to the bottom of Tasmania providing...
As many as 35,000 cybersecurity-related annual job openings in California will need to be filled in the near future, a new research paper asserts, but “an...
President Donald Trump has signed the NIST Small Business Cybersecurity Act into law requiring the National Institute of Standards and Technology to provide...
NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems, provides instructions, recommendations, and considerations...
Known vulnerability testing focuses on platform and dependency weaknesses. It involves testing software for vulnerabilities that have already been discovered in...
Importantly, as Science magazine notes, the bill would authorize three agencies — the Energy Department, the National Institute of Standards and Technology and...
The National Institute of Standards and Technology is working hard to get critical privacy controls worked into the next version of its risk management...
Because of the level of the abundant risks due to vulnerabilities in multitudes of mobile communications apps, a 50-page draft app vetting process and guidance...
Tali Ben-Aroya walked into a room at a technology company in the United States and realized that among the 30-odd entrepreneurs she was the only woman.
“From an employer perspective, we have to change the mindset of what makes somebody qualified to do the work,” Rodney Petersen, NICE director, told The Daily...
The Workforce Management subgroup of the National Initiative for Cybersecurity Education (NICE) launched a project to draft guidelines for all members of an...
Six years ago, during the first cybersecurity course offered at Baltimore’s Parkville High School, a student stumbled upon a mysterious section of the network.
" Rather than making hundreds of individual sample coins with various metal ratios, the team plugged in all the metallic variables into a computer program that...
Michael Ogata, a computer scientist for the National Institute for Standards and Technology, explains how the methodology used in his Mobile Application...