An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
As many as 35,000 cybersecurity-related annual job openings in California will need to be filled in the near future, a new research paper asserts, but “an
President Donald Trump has signed the NIST Small Business Cybersecurity Act into law requiring the National Institute of Standards and Technology to provide
NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems, provides instructions, recommendations, and considerations
Known vulnerability testing focuses on platform and dependency weaknesses. It involves testing software for vulnerabilities that have already been discovered in
Importantly, as Science magazine notes, the bill would authorize three agencies — the Energy Department, the National Institute of Standards and Technology and
The National Institute of Standards and Technology is working hard to get critical privacy controls worked into the next version of its risk management
Because of the level of the abundant risks due to vulnerabilities in multitudes of mobile communications apps, a 50-page draft app vetting process and guidance
Tali Ben-Aroya walked into a room at a technology company in the United States and realized that among the 30-odd entrepreneurs she was the only woman.
“From an employer perspective, we have to change the mindset of what makes somebody qualified to do the work,” Rodney Petersen, NICE director, told The Daily
The Workforce Management subgroup of the National Initiative for Cybersecurity Education (NICE) launched a project to draft guidelines for all members of an
Six years ago, during the first cybersecurity course offered at Baltimore’s Parkville High School, a student stumbled upon a mysterious section of the network.
" Rather than making hundreds of individual sample coins with various metal ratios, the team plugged in all the metallic variables into a computer program that
Michael Ogata, a computer scientist for the National Institute for Standards and Technology, explains how the methodology used in his Mobile Application
An intimate visit with the family behind NIST RM 8329 - Human DNA for Whole-Genome Variant Assessment (Trio of Eastern European Ashkenazim Jewish Ancestry)
The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for
As law enforcement agencies learn how to gather evidence from drones used to commit crimes, they’re finding that extracting useful forensic evidence is a
"As the first CRISPR clinical trials begin this year in the U.S. and Europe, a number of genome-editing questions remain unanswered. One of the big ones: how to
The National Institute of Standards and Technology is updating its Risk Management Framework to help public- and private-sector organizations better protect
The National Institute of Standards and Technology on Wednesday released a draft update to its influential Risk Management Framework, which federal agencies use
"Scientists at the Joint Institute of Metrology and Biology (JIMB)—a collaboration between Stanford University and the National Institute of Standards and
A report by [NIST] details results from a September 2017 challenge held by [IARPA] to find more accurate (and less uncomfortable) method to capture fingerprints
This story is part of Map to the Middle Class, a Hechinger Report series examining how schools can prepare students for the good middle-class jobs of the future