Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

News & Updates

Showing 18 matching records.
December 6, 2018

NIST has published NISTIR 8011 Volume 3, "Automation Support for Security Control Assessments: Software Asset Management."

September 17, 2018

[9/18/18--TEMPORARILY WITHDRAWN. TO BE RE-POSTED AT A LATER DATE] Draft NISTIR 8222 identifies 17 technical trust-related issues that may negatively impact the adoption of IoT products and services.

August 23, 2018

According to a recent independent analysis, e-commerce fraud increased by 30 percent in 2017, compared to.....

July 23, 2018

Draft NIST Special Publication (SP) 800-163 Revision 1, Vetting the Security of Mobile Applications,defines the app vetting process—a software assurance method for mobile applications. Revision 1 updates this publication...

April 5, 2018

When software programs in a network are unmanaged, or unidentified, they are vulnerable to attacks, and.....

March 14, 2018

Access control is the process of defining and limiting which users are allowed access to particular resources.  NIST researchers have recently published a book on Attribute-based access control (ABAC), one of the...

January 26, 2018

 A new NIST cybersecurity white paper is available, Security Considerations for Code Signing. 

September 25, 2017

NIST Announces the Final Release of Special Publication (SP) 800-190, Application Container Security Guide

September 14, 2017

NIST Releases the Second Draft of Special Publication 800-125A, Security Recommendations for Hypervisor Deployment, for public comment.

August 1, 2017

NIST requests public comments on the release of Draft Special Publication (SP) 800-70 Revision 4, National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. 

August 31, 2015

NIST is pleased to announce the third public comment release of NIST Internal Report (NISTIR) 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags. 

July 22, 2015

NIST is pleased to announce the second public comment release of NIST Internal Report (NISTIR) 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags. 

May 29, 2015

NIST is pleased to announce the public comment release of NIST Internal Report (NISTIR) 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags. 

August 30, 2012
Federal Register Number: 2012-21461

NIST seeks additional comments on specific sections of the 2009 Draft Federal Information Processing Standard 140-3, Security Requirements for Cryptographic Modules… Comments were due October 1, 2012.

December 11, 2009
Federal Register Number: E9-29567

NIST announces the Revised Draft Federal Information Processing Standard 140-3, Security Requirements for Cryptographic Modules. Comments must be received on or before March 11, 2010.

July 13, 2007
Federal Register Number: E7-13654

This notice announces Draft Federal Information Processing Standard 140-3, Security Requirements for Cryptographic Modules, for public review and comment. The draft standard, designated “Draft FIPS 140-3,” is proposed to...

January 12, 2005
Federal Register Number: 05-545

NIST announces that it plans to develop Federal Information Processing Standard (FIPS) 140-3, which will supersede FIPS 140-2, Security Requirements for Cryptographic Modules.

October 23, 1998
Federal Register Number: 98-28513

NIST proposes the reaffirmation of Federal Information Processing Standard (FIPS) 140-1, Security Requirements for Cryptographic Modules