The report focuses on the cryptographic objects that modern systems use to authenticate users, devices, and software services ...
With increasing dependency on information systems and advances in cloud computing, the smart grid and mobile computing, maintaining the confidentiality and integrity of citizens' personally ...
The risk of cyber-attack for all kinds of organizations and businesses has soared in recent years. Malware has spread like wildfire, botnets and cybercrime software tools are easily obtained, and ...
This report first appeared on CyberScoop. NIST Special Publication 800-53 isn’t the most exciting book, but for federal IT managers, the canonical catalogue of cybersecurity controls is like the ...
Don't feel sorry that Ron Ross spent part of Veterans Day working on new guidance from NIST. The retired U.S. Army lieutenant colonel is passionate about his work. See Also: Thwarting Cyberthreats in ...
The U.S. National Institute of Standards and Technology (NIST) issues numerous standards, guides and directions on a wide variety of technology and security issues. Most readers are familiar with the ...
New NIST controls will include supply chain security and privacy controls ... if they get past review. An Office of Management and Budget review is delaying the release of new supply chain and privacy ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results