An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
There is a smart grid messaging framework known as an Open Field Message Bus (OpenFMB); it describes a publish-and-subscribe model of communication for smart
The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch. After spending more than three years
It has been almost a year and a half since the second round of the NIST PQC Standardization Process began. After careful consideration, NIST would like to
Storage infrastructure—along with compute (encompassing OS and host hardware) and network infrastructures—is one of the three fundamental pillars of Information
NIST has published NISTIR 8214A, NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives, which presents a structured approach for
A new publication by cryptography experts at the National Institute of Standards and Technology (NIST) proposes the direction the technical agency will take to
Internet Protocol Security (IPsec) is a network layer security control used to protect communications over public networks, encrypt IP traffic between hosts
NIST is pleased to announce the release of OSCAL 1.0.0 Milestone 3. This is the third official milestone pre-release of OSCAL and marks the last pre-release
NIST announces the publication of NIST Special Publication (SP) 800-133 Revision 2, Recommendation for Cryptographic Key Generation , which discusses the
As microservices-based applications are increasingly deployed within large enterprises and cloud-based environments, dedicated and scalable infrastructure is
NIST's National Cybersecurity Center of Excellence (NCCoE) is initiating the development of practices to ease the migration from the current set of public-key
Federal agencies are directed to implement a program to continuously monitor their organizational information security status. NIST Special Publication (SP) 800
NIST has updated its key management guidance in S pecial Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This
NIST has updated its key management guidance in S pecial Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This
U.S. Government concerns about the cybersecurity of electric vehicle supply equipment (EVSE) infrastructure cover a range of issues. What impact would EVSE have
NIST requests comments on the Draft Cybersecurity White Paper, Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security
When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable
NIST requests comments on Draft Special Publication (SP) 800-210, General Access Control Guidance for Cloud Systems, which presents an initial step toward
Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2, Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2, Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which
NIST Special Publications (SP) 800-140 and -140A through -140F are now available. With the completion of these documents, the Cryptographic Module Validation
As millions of Americans transition from an office environment to their homes to continue to work, maintaining cybersecurity while teleworking is imperative
After your organization forms a general plan for tackling its cybersecurity and privacy risk management issues, it needs particular state-of-the-art tools to