An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In an effort to counter the often pernicious effect of biases in artificial intelligence (AI) that can damage people’s lives and public trust in AI, the
NIST's National Cybersecurity Center of Excellence (NCCoE) has finalized NISTIR 8320A, Hardware-Enabled Security: Container Platform Security Prototype. The
To help foster wider access to voting, the National Institute of Standards and Technology (NIST) is requesting information from the public about barriers that
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report (NISTIR) 8335, Identity as a
The White House Office of Science and Technology Policy and the National Science Foundation announced the formation of the National Artificial Intelligence (AI)
NIST has developed the Open Security Controls Assessment Language, which is a multi-format framework that allows security professionals to automate security
NIST is pleased to announce the release of Open Security Controls Assessment Language (OSCAL) 1.0.0. This is the first, official, major release of OSCAL and
2021 Federal Cybersecurity Workforce Webinar Series The National Initiative for Cybersecurity Education and the Office of Personnel Management are pleased to
The National Cybersecurity Center of Excellence (NCCoE) has released a new preliminary draft report, National Institute of Standards and Technology (NIST)
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report ( NISTIR) 8336, Background on
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new Preliminary Draft report, NIST Interagency or Internal Report ( NISTIR) 8374
Not all security vulnerabilities can be found through automated processes or testing. Internal and external reporting of security vulnerabilities in software
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Migration to Post-Quantum Cryptography. Publication of
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report ( NISTIR) 8334, Using Mobile
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NISTIR 8320, Hardware-Enabled Security: Enabling a Layered Approach to
NIST will hold a virtual workshop on Artificial Intelligence Measurement and Evaluation (AIME) June 15-17, 2021. The three-day workshop aims to bring together
NIST’s National Cybersecurity Center of Excellence (NCCoE) has published NIST Cybersecurity Practice Guide Special Publication (SP) 1800-15, Securing Small
Network-layer onboarding of an Internet of Things (IoT) device is the provisioning of network credentials to that device. The current lack of trusted IoT device
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Data Classification Practices: Facilitating Data-Centric
Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in
The National Institute of Standards and Technology (NIST) will host a virtual workshop on June 2 and 3 , 2021 to enhance the security of the software supply
NIST announces the publication of a Cybersecurity White Paper on confidence mechanisms for Internet of Things (IoT) devices, Establishing Confidence in IoT
Announcing The FISSEA Summer Forum The FISSEA Forums are quarterly meetings to provide opportunities for policy and programmatic updates, the exchange of best
Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are