Author: News and Events Feed by Topic

Researchers at the National Institute of Standards and Technology (NIST) have developed a modeling technique that can save time and money in estimating how to configure wireless communications systems to share the same transmission frequencies. The NIS…

Read More Encouraging Coexistence: NIST Model Cuts Measurement Needs for Spectrum Sharing by About 33%

When it comes to passwords, the challenges are endless. We must create multiple passwords to manage our many online accounts, from email to shopping sites and social media profiles. We have to safely keep track of these many passwords and ensure they’r…

Read More NIST Study on Kids’ Passwords Shows Gap Between Knowledge of Password Best Practices and Behavior

President Biden on July 28, 2021, signed a new National Security Memorandum, “Improving Cybersecurity for Critical Infrastructure Control Systems which directs the Department of Homeland Security (DHS) to work with the Department of Commerce (DOC) in d…

Read More White House National Security Memo Issued | NIST & DHS Developing Cybersecurity Performance Goals for Critical Infrastructure Control Systems

President Biden on July 28, 2021, signed a new National Security Memorandum, “Improving Cybersecurity for Critical Infrastructure Control Systems which directs the Department of Homeland Security (DHS) to work with the Department of Commerce (DOC) in d…

Read More White House National Security Memo Issued | NIST & DHS Developing Cybersecurity Performance Goals for Critical Infrastructure Control Systems

NIST is seeking suggestions and feedback on challenges and practical approaches to initiating cybersecurity labeling efforts for Internet of Things (IoT) devices and consumer software. The information received will help NIST carry out one of its multip…

Read More IoT Devices & Software | NIST Workshop + Call for Papers on Cybersecurity Labeling Programs for Consumers

NIST today fulfilled two of its assignments to enhance the security of the software supply chain called for by a May 12, 2021, Presidential Executive Order on Improving the Nation’s Cybersecurity (14028). That Executive Order (EO) charges multiple agen…

Read More NIST Delivers Two Key Publications to Enhance Software Supply Chain Security Called for by Executive Order

Draft NISTIR 8286A, Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM), is now available for a second public comment period. This report provides a more in-depth discussion of the concepts introduced in NISTIR 8286, Inte…

Read More Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management: 2nd Public Draft of NISTIR 8286A Available for Comment

The National Cybersecurity Center of Excellence (NCCoE) has finalized its project description on the Automation of the Cryptographic Module Validation Program (CMVP). Increased automation is necessary because a number of elements of the current validat…

Read More Automation of the Cryptographic Module Validation Program (CMVP): Final Project Description Released

Space operations are vital to advancing the security, economic prosperity, and scientific knowledge of the Nation. However, cyber-related threats to space assets and supporting infrastructure pose increasing risks to the economic promise of emerging ma…

Read More Introduction to Cybersecurity for Commercial Satellite Operations: Draft NISTIR 8270 Available for Comment

The White House Office of Science and Technology Policy and the National Science Foundation announced the formation of the National Artificial Intelligence (AI) Research Resource Task Force June 10, 2021. The task force will advance the objectives stat…

Read More ITL Chief of Staff Elham Tabassi to serve on newly formed National AI Research Resource Task Force

Not all security vulnerabilities can be found through automated processes or testing. Internal and external reporting of security vulnerabilities in software and information systems owned or utilized by the Federal Government is critical to mitigating …

Read More Recommendations for Federal Vulnerability Disclosure Guidelines: Draft NIST SP 800-216 Available for Comment

NIST’s National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report (NISTIR) 8334, Using Mobile Device Biometrics for Authenticating First Responders. Many public safety organizations (PSOs) a…

Read More Using Mobile Device Biometrics for Authenticating First Responders: Draft NISTIR 8334 Available for Comment

NIST’s National Cybersecurity Center of Excellence (NCCoE) has published NIST Cybersecurity Practice Guide Special Publication (SP) 1800-15, Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manuf…

Read More NIST Cybersecurity Practice Guide SP 1800-15, Securing Small Business and Home IoT Devices: Mitigating Network-Based Attacks Using MUD

The National Institute of Standards and Technology (NIST) will host a virtual workshop on June 2 and 3, 2021 to enhance the security of the software supply chain and to fulfill the President’s Executive Order on Improving the Cybersecurity of the Feder…

Read More Workshop and Call for Position Papers on Standards and Guidelines to Enhance Software Supply Chain Security

NIST announces the publication of a Cybersecurity White Paper on confidence mechanisms for Internet of Things (IoT) devices, Establishing Confidence in IoT Device Security: How do we get there? This paper describes the landscape of confidence mechanism…

Read More NIST Seeks Comments on “Establishing Confidence in IoT Device Security: How do we get there?”

NIST is in the process of a periodic review and maintenance of its cryptography standards and NIST Special Publications. A description of the review process is available at the Crypto Publication Review Project page. Currently, we are reviewing the fol…

Read More NIST Requests Public Comments on Several Existing Cryptography Standards and Special Publications

More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the cy…

Read More NIST Releases Draft of NIST SP 800-161, Revision 1 for comment, Cyber Supply Chain Risk Management Practices for Systems and Organizations.

NIST’s National Cybersecurity Center of Excellence (NCCoE) has released the second draft of NIST Special Publication (SP) 1800-30, Securing Telehealth Remote Patient Monitoring Ecosystem. Increasingly, healthcare delivery organizations (HDOs) incorpora…

Read More Second Draft of “Securing Telehealth Remote Patient Monitoring Ecosystem” (SP 1800-30) is Available for Comment