An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
While our NICE Conference will be in June 2022, don't miss this year's upcoming event! NICE Symposium | Tuesday, November 16th | 1 - 5 p.m. EST Join us on
NIST's National Cybersecurity Center of Excellence (NCCoE) has finalized NISTIR 8320A, Hardware-Enabled Security: Container Platform Security Prototype. The
The White House Office of Science and Technology Policy and the National Science Foundation announced the formation of the National Artificial Intelligence (AI)
To help foster wider access to voting, the National Institute of Standards and Technology (NIST) is requesting information from the public about barriers that
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report (NISTIR) 8335, Identity as a
NIST has developed the Open Security Controls Assessment Language, which is a multi-format framework that allows security professionals to automate security
The National Cybersecurity Center of Excellence (NCCoE) has released a new preliminary draft report, National Institute of Standards and Technology (NIST)
2021 Federal Cybersecurity Workforce Webinar Series The National Initiative for Cybersecurity Education and the Office of Personnel Management are pleased to
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new Preliminary Draft report, NIST Interagency or Internal Report ( NISTIR) 8374
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report ( NISTIR) 8336, Background on
Not all security vulnerabilities can be found through automated processes or testing. Internal and external reporting of security vulnerabilities in software
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Migration to Post-Quantum Cryptography. Publication of
NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report ( NISTIR) 8334, Using Mobile
Firefighting is a race against time. Exactly how much time? For firefighters, that part is often unclear. Building fires can turn from bad to deadly in an
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NISTIR 8320, Hardware-Enabled Security: Enabling a Layered Approach to
NIST’s National Cybersecurity Center of Excellence (NCCoE) has published NIST Cybersecurity Practice Guide Special Publication (SP) 1800-15, Securing Small
NIST will hold a virtual workshop on Artificial Intelligence Measurement and Evaluation (AIME) June 15-17, 2021. The three-day workshop aims to bring together
Network-layer onboarding of an Internet of Things (IoT) device is the provisioning of network credentials to that device. The current lack of trusted IoT device
Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Data Classification Practices: Facilitating Data-Centric
The National Institute of Standards and Technology (NIST) will host a virtual workshop on June 2 and 3 , 2021 to enhance the security of the software supply
NIST announces the publication of a Cybersecurity White Paper on confidence mechanisms for Internet of Things (IoT) devices, Establishing Confidence in IoT
Announcing The FISSEA Summer Forum The FISSEA Forums are quarterly meetings to provide opportunities for policy and programmatic updates, the exchange of best
Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore
From the branching pattern of leaf veins to the variety of interconnected pathways that spread the coronavirus, nature thrives on networks — grids that link the