An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
A draft implementation guide ( NISTIR 8183A) for the Cybersecurity Framework (CSF) Manufacturing Profile Low Security Level has been developed for managing
Cryptographic mechanisms are often used to protect the integrity, authenticity, and confidentiality of sensitive and high value data that is vulnerable to
A draft white paper is now available for comment, An Application of Combinatorial Methods for Explainability in Artificial Intelligence and Machine Learning.
The White House has released a new Executive Order on America’s Cybersecurity Workforce. The Executive Order will implement programs that will grow and
On March 22, 2019, the Secretary of Commerce approved Federal Information Processing Standard (FIPS) 140-3, Security Requirements for Cryptographic Modules.
GAITHERSBURG, Md.—The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) is seeking information about technical standards and
The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary draft practice guide, SP 1800-15, Securing Small-Business and Home Internet
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the
NIST Special Publication (SP) 800-163 Revision 1, Vetting the Security of Mobile Applications, is an important update to NIST guidance on mobile application
NIST has completed the initial check of all algorithm submission packages received in response to the August 27, 2018 Request for Nominations for Lightweight
The Spring 2019 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government developments related to the
We invite you to join us for the 32nd annual FISSEA conference on June 27-28, 2019! This year’s theme is Innovations in Cybersecurity Awareness and Training
In late Fall 2018, NICE staff participated in a convening of experts from corporate, academic, nonprofit, and government backgrounds to consider new ideas and
Cybersecurity and usability must coexist. Systems that prioritize usability over a strong security posture may fall prey to increasingly sophisticated cyber
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect
Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission