Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Cybersecurity of Genomic Data

Author(s)
Ronald Pulivarti, Natalia Martin, Frederick R. Byers, Justin Wagner, Justin Zook, Samantha Maragh, Jennifer McDaniel, Kevin Wilson, Martin Wojtyniak, Brett Kreider, Ann-Marie France, Sallie Edwards, Tommy Morris, Jared Sheldon, Scott Ross, Phillip Whitlow
Genomic data has enabled the rapid growth of the U.S. bioeconomy and is valuable to the individual, industry, and government because it has multiple intrinsic

Intelligent Flexible Manufacturing Cell

Author(s)
Ethan Hollingsworth, Eric Holterman, Allison Barnard Feeney
Designed around Industry 4.0 based digital technology, flexible manufacturing cells are envisioned to comprise a variety of machines capable of peer-to-peer

2023 NIST Summary of U.S. Legal Metrology Activities

Author(s)
Lisa Warfield, Katrice Lippa, Jan Konijnenburg, Loren Minnich, Gloria Diane Lee, Juana Williams, John McGuire
The NIST Office of Weights and Measures (OWM) presents its second issue of the 2023 NIST Annual Summary of U.S. Legal Metrology Activities report. This report

Information and Communications Technology (ICT) Risk Outcomes

Author(s)
Stephen Quinn, Nahla Ivy, Karen Scarfone, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Robert Gardner, Julie Chua
The increasing frequency, creativity, and severity of technology attacks means that all enterprises should ensure that information and communications technology

Enterprise Impact of Information & Communications Technology Risk

Author(s)
Stephen Quinn, Nahla Ivy, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Karen Scarfone, Robert Gardner, Julie Chua
All enterprises should ensure that information and communications technology (ICT) risk receives appropriate attention within their enterprise risk management

NIST Phish Scale User Guide

Author(s)
Shanee Dawkins, Jody Jacobs
The phishing cyber threat exploits vulnerabilities in the U.S. and around the world across private and public sectors. Embedded phishing awareness training

NIST SI Units Card Deck

Author(s)
Dinelka Jagoda, Elizabeth Benham
Welcome to the SI Units Card Deck! This interactive educational activity offers a fun way for students to enhance their understanding of the International