An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Hardware/Server Virtualization is a foundational technology in a cloud computing environment and the hypervisor is the key software in that virtualized
NIST Special Publication (SP) 800-64 Revision 2, Security Considerations in the System Development Life Cycle (October 2008), has been withdrawn. It includes
The National Cybersecurity Center of Excellence (NCCoE) at NIST is seeking comments on a revised draft of the practice guide NIST SP 1800-13, Mobile Application
A draft implementation guide ( NISTIR 8183A) for the Cybersecurity Framework (CSF) Manufacturing Profile Low Security Level has been developed for managing
Cryptographic mechanisms are often used to protect the integrity, authenticity, and confidentiality of sensitive and high value data that is vulnerable to
A draft white paper is now available for comment, An Application of Combinatorial Methods for Explainability in Artificial Intelligence and Machine Learning.
On March 22, 2019, the Secretary of Commerce approved Federal Information Processing Standard (FIPS) 140-3, Security Requirements for Cryptographic Modules.
The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary draft practice guide, SP 1800-15, Securing Small-Business and Home Internet
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the
NIST Special Publication (SP) 800-163 Revision 1, Vetting the Security of Mobile Applications, is an important update to NIST guidance on mobile application
NIST has completed the initial check of all algorithm submission packages received in response to the August 27, 2018 Request for Nominations for Lightweight
Cybersecurity and usability must coexist. Systems that prioritize usability over a strong security posture may fall prey to increasingly sophisticated cyber
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process
Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission
NIST announces the publication of NIST Internal Report (NISTIR) 8214, Threshold Schemes for Cryptographic Primitives. This publication provides a high-level
Summary
NIST requests public comments on Draft Special Publication 800-38G Revision 1, Recommendation for Block Cipher Modes of Operation: Methods for Format
The past forty years have seen both the worldwide adoption of email and the simultaneous rise of Internet-based crimes and threats. While the Internet’s
NIST Special Publication 800-162, Guide to Attribute Based Access Control (ABAC) Definition and Considerations, has been updated with minor editorial changes
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control