An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Reducing the cybersecurity risk to one of the most vulnerable aspects of commerce — global supply chains — is the goal of a new publication by the National
Criminals sometimes damage their mobile phones in an attempt to destroy evidence. They might smash, shoot, submerge or cook their phones, but forensics experts
In a general sense, an informative reference indicates how one document relates to another document. The National Cybersecurity Online Informative References
As microservices-based applications are increasingly adopted within large enterprises and cloud-based environments, there is a need for a dedicated, scalable
Our data-driven society has a tricky balancing act to perform: building innovative products and services that use personal data while still protecting people’s
Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results
Federal agencies, under the Federal Information Security Modernization Act of 2014 (FISMA) and Office of Management and Budget (OMB) circulars and memoranda
The Winter 2019-20 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the
An incredible variety and volume of Internet of Things (IoT) devices are being produced. Manufacturers can help their customers by improving how securable the
How accurately do face recognition software tools identify people of varied sex, age and racial background? According to a new study by the National Institute
New biometric research data — ranging from fingerprints to facial photographs and iris scans — is now available from the National Institute of Standards and
NIST invites comments on Draft NIST Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. All of the digital signature
The United States continues to have complete dependence on information technology deployed in critical systems and applications in both the public and private
When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable
The National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST), is planning to update the NICE
One day in the future when you need medical care, someone will examine you, diagnose the problem, remove some of your body’s healthy cells, and then use them to
A new research effort at the National Institute of Standards and Technology (NIST) aims to address a pervasive issue in our data-driven society: a lack of
NIST invites comments on Draft NISTIR 8214A, Towards NIST Standards for Threshold Schemes for Cryptographic Primitives: A Preliminary Roadmap, which presents a
Summary A Federal Register Notice (FRN) announces a Request for Comments on Draft FIPS 186-5 and Draft NIST Special Publication (SP) 800-186. NIST seeks
NIST's National Cybersecurity Center of Excellence (NCCoE) has released Draft NISTIR 8269, A Taxonomy and Terminology of Adversarial Machine Learning, for
To improve approaches for analyzing very large quantities of data, computer scientists at the National Institute of Standards and Technology (NIST) have
In recent years, numerous routing control plane anomalies such as Border Gateway Protocol (BGP), prefix hijacking, and route leaks have resulted in denial of
NIST announces an update of Special Publication (SP) 800-128 , Guide for Security-Focused Configuration Management of Information Systems, which provides