The Spring 2019 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government develo
D.C. Area Crypto Day is a bi-annual, one-day regional meeting of cryptographic researchers to promote research collaborations and disseminate fresh, state-of-the-art results in cryptography. Previous D.C.
In accordance with the Federal Advisory Committee Act (FACA), Public Law 92-463, as amended (5 U.S.C. Appendix 2), the U.S.
In late Fall 2018, NICE staff participated in a convening of experts from corporate, academic, nonprofit, and government backgrounds to consider new ideas and implementable strategies to bring women into and up through cyberse
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect sensitive information, and plan for potentially significant changes in the
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process.
Join the Cybersecurity for IoT Program as we discuss our thoughts on considerations for a core cybersecurity capabilities baseline for IoT devices.
FIPS 201, Personal Identity Verification (PIV) for federal employees and contractors will be going through a third revision soon.
After over two decades of relative architectural stability for distributed memory parallel computers, the end of Dennard scaling and the looming end of Moore's "law" is forcing major changes in computing systems.
The need for effective human-robot interaction (HRI) continues to present challenges for the field of robotics. As new technologies are integrated into human-robot teams in a myriad of application domains, exposures to and ex
Latest updates: All visitors to the NIST campus must be pre-registered. There is no onsite registration for meetings at NIST.
The NICE Program Office will be participating in the RSA Conference next week in San Francisco, California. See below for ways you can connect with us. We hope to see you there!
When vacationers buy a stake in a beachfront timeshare, they decide in advance who gets to use the property when.
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control.
GAITHERSBURG, Md.—Five years after the release of the Framework for Improving Critical Infrastructure Cybersecurity, organizations across all sectors of the economy ar
Engineers at the National Institute of Standards and Technology (NIST) needed a way to secure smart manufacturing systems using the
The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our current encryption methods obsolete.
Between the NICE Conference & Expo and the NICE K12 Cybersecurity Education Conference, over 1000 attendees came together
The Winter 2018-19 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government
NIST has released Draft NIST Special Publication (SP) 800-189, Secure Interdomain Traffic Exchange: Routing Robustness and DDoS Mitigation, which provides technical guidance and recommendations for deploying t
There has never been a better time to bring modern computation and analytics to inform individualized treatments and interventions for our most vulnerable populations.
The White House has announced a new 5-year STEM strategy,