An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Grain-128AEAD is one of the second-round candidates of the NIST lightweight cryptography standardization process. There is an existing body of third-party
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of
Michael Fagan, Katerina N. Megas, Karen Scarfone, Matt Smith
Los dispositivos de internet de las cosas (IoT) suelen carecer de las capacidades de ciberseguridad de dispositivo que los clientes (organizaciones y personas)
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os dispositivos da Internet das Coisas (IoT) muitas vezes não possuem recursos de segurança cibernética de acordo com os dispositivos que os seus clientes —
Victoria Pillitteri, Kelley Dempsey, Chad Baer, Ron Rudman, Robert Niemeyer, Susan Urban
This publication describes an example methodology for assessing an organization's Information Security Continuous Monitoring (ISCM) program. It was developed
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Os recursos de cibersegurança dos dispositivos são funções que os dispositivos de computação fornecem através dos seus próprios meios técnicos (ex: hardware e
Michael Fagan, Katerina N. Megas, Matt Smith, Karen Scarfone
Las capacidades de ciberseguridad de dispositivo son características o funciones de ciberseguridad que los dispositivos informáticos proporcionan por sus
Hotels have become targets for malicious actors wishing to exfiltrate sensitive data, deliver malware, or profit from undetected fraud. Property management
Kaitlin R. Boeckl, Michael Fagan, William Fisher, Naomi Lefkovitz, Katerina N. Megas, danna o'rourke, Karen Scarfone, Benjamin Piccarreta, Ellen Nadeau
La internet de las cosas (IoT) es un conjunto de diversas tecnologías que evolucionan y se difunden con rapidez, y que interactúan con el mundo físico. Muchas
Kaitlin R. Boeckl, Michael Fagan, William Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Benjamin Piccarreta, Karen Scarfone, Danna O'Rourke
A Internet das Coisas (IoT) é uma coleção em rápida evolução e expansão de diversas tecnologias que interagem com o mundo físico. Muitas organizações não estão
Michael Fagan, Katerina N. Megas, Barbara Cuthill, Mary Raguso, John Wiltberger
This report provides a summary of the discussion and findings from the NIST Cybersecurity Risks in Consumer Home IoT Devices virtual workshop in October 2020
Developed based on over 4 years of NIST phishing training data, the NIST Phish Scale is a DIY method for rating human phishing detection difficulty – key to
While the threats may appear to be vastly different, further investigation reveals that the cybersecurity community can learn much from the COVID-19 response.
Ronald S. Ross, Victoria Pillitteri, Gary Guissanie, Ryan Wagner, Richard Graubart, Deborah Bodeau
The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and
Ronald S. Ross, Victoria Pillitteri, Kelley Dempsey, Mark Riddle, Gary Guissanie
The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and
This report summarizes the feedback received on the work of the NIST Cybersecurity for IoT program on device cybersecurity at a virtual workshop in July 2020
Jennifer L. Cawthra, Sue S. Wang, Bronwyn J. Hodges, Kangmin Zheng, Ryan T. Williams, Jason J. Kuruvilla, Christopher L. Peloquin, Kevin Littlefield, Bob Neimeyer
Medical imaging plays an important role in diagnosing and treating patients. The system that manages medical images is known as the picture archiving
This publication provides security and privacy control baselines for the Federal Government. There are three security control baselines (one for each system
This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, consumers may lack
Advanced Persistent Threat (APT) campaigns employ sophisticated strategies and tactics to achieve their attack goal. The evolution of APT strategies and tactics