This is a potential security issue, you are being redirected to https://csrc.nist.gov
Special Publications (SPs)
Security & Privacy
Laws & Regulations
Activities & Products
Computer Security Division
Applied Cybersecurity Division
<< < 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 > >>
NIST Releases Special Publication 800-12 Revision 1, An Introduction to Information Security
NIST Special Publication 800-63-3, Digital Identity Guidelines is now final
NIST is pleased to announce the final publication of NIST Interagency Report (NISTIR) 8011, Automation Support for Security Control Assessments, Volumes 1 and 2.
The Information Security and Privacy Advisory Board (ISPAB) will meet June 28-30, 2017. All sessions will be open to the public.
NIST announces the public comment release of Draft Special Publication 800-193, Platform Firmware Resiliency Guidelines. The platform is a collection of fundamental hardware and firmware components needed to boot and...
NISTIR 8170 rovides guidance on how the Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework) can be used in the U.S. Federal Government in conjunction with the current and planned suite...
As the world rapidly embraces the Internet of Things, properly securing medical devices has grown challenging for most healthcare delivery organizations (HDOs).......
The Department of Homeland Security (DHS) has published the "Study on Mobile Device Security," a report to Congress that details current and emerging threats to the Federal Government's use of mobile devices. It also...
SP 800-121 Rev. 2 has been approved as final & is now available.
NIST releases a draft whitepaper "Profiles for the Lightweight Cryptography Standardization Process".
Recent Cryptanalysis of FF3 - Special Publication 800-38G
NIST announces the public comment release of Draft Special Publication (SP) 800-190, Application Container Security Guide.
What is the current status of release of Draft Special Publication 800-53 Revision 5? This news item will explain the current status of this document.
NISTIR 8114, Report on Lightweight Cryptography has been approved as final and is now available.
NIST's NCCoE invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Capabilities Assessment for Securing Manufacturing Industrial Control Systems...
The Final Public Draft Cybersecurity Framework Manufacturing Profile is now available for public comment.
The Information Security and Privacy Advisory Board (ISPAB) will meet March 29-31, 2017. All sessions will be open to the public.
On Thursday, February 23rd, Google announced that a team of researchers from the CWI Institute in Amsterdam and Google have successfully demonstrated an attack on the SHA-1 hash algorithm by creating two files that...
NIST has launched a beta site for a new version of CSRC.nist.gov: https://beta.csrc.nist.gov. It will be available alongside http://csrc.nist.gov for several months as we continue to fix issues, implement...
NCCoE Released Draft Special Publication 1800-7, Situational Awareness for Electric Utilities for public comment.
NIST requests comments on a proposed update to the Framework for Critical Infrastructure Cybersecurity (the "Framework"). The proposed update to the Framework is available for review at http://www.nist.gov/cyberframework...
NIST solicits nominations for candidate algorithms to be considered for public-key post-quantum standards. Submission requirements and evaluation criteria are available at https://www.nist.gov/pqcrypto. Proposals must be...
Special Publication 800-179 aims to assist IT professionals in securing Apple OS X 10.10 desktop and laptop systems within various environments. It provides detailed information about the security features of OS X 10...
NIST invites comments on Draft NIST SP 800-187, Guide to LTE Security. Cellular technology plays an increasingly large role in society as it has become the primary portal to the Internet for a large segment of...
NIST announces the release of Special Publication 800-160, Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. ...
<< first < previous 1 2 3 4 5 6 7 8 9 10 next > last >>