An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore
From the branching pattern of leaf veins to the variety of interconnected pathways that spread the coronavirus, nature thrives on networks — grids that link the
NIST is in the process of a periodic review and maintenance of its cryptography standards and NIST Special Publications. A description of the review process is
Taking the latest invention out of our laboratories and into the marketplace isn’t a simple jaunt from point A to point B. NIST lead patent paralegal Dana
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are
Like conductors of a spooky symphony, researchers at the National Institute of Standards and Technology (NIST) have “entangled” two small mechanical drums and
Preliminary results of an ongoing internal analysis by the National Institute of Standards of Technology (NIST) indicate that inadequacies in training and
NIST's National Cybersecurity Center of Excellence (NCCoE) has released the second draft of NIST Special Publication (SP) 1800-30, Securing Telehealth Remote
Since 2010, NIST’s Public Safety Communications Research (PSCR) division has annually convened stakeholders across public safety, industry, and academia to
On April 20-22, NIST MEP Network Learning and Strategic Competitions Division hosted three virtual half-day sessions for the Tab Wilkins Emerging MEP Leaders
The Illinois Manufacturing Excellence Center (IMEC) announced a new book which is described as a guide and valuable resource to help manufacturing companies
The Technology Partnerships Office (TPO) recently attended the Federal Labs Consortium’s (FLC) annual, national meeting, which was virtual this year. The FLC
From the stars to the Lilliputian — a new camera lens using the power of reflection has the potential to transform neutron imaging. Wolter optics, named after
NIST’s Public Safety Communications Research (PSCR) Division has awarded $8 million to the Crisis Technologies Innovation Lab at Indiana University’s (IU)
Our choice of language — what we say and how we say it — can have unanticipated effects on our audience, potentially conveying messages other than those we
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are
NIST is planning to update NIST Special Publication (SP) 800-66, Revision 1, An Introductory Resource Guide for Implementing the Health Insurance Portability
Like a chameleon of the night sky, the Moon often changes its appearance. It might look larger, brighter or redder, for example, due to its phases, its position
The National Cybersecurity Center of Excellence (NCCoE) has released the final version of the NIST Cybersecurity White Paper, Getting Ready for Post-Quantum
Researchers have spent more than three decades developing and studying miniature biosensors that can identify single molecules. In five to 10 years, when such
GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has joined the U.S. National Science Foundation (NSF
The protection of controlled unclassified information (CUI) in nonfederal systems and organizations—especially CUI associated with a critical program or high
Unveiled today at the Federal Cybersecurity Workforce Summit, CyberSeek™ has expanded and updated its resources in its ongoing effort to close the cybersecurity
NIST has released a new version of its measurement tools aimed at improving trust and confidence in emerging technologies for improving the security and