Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 951 through 975 of 1226 matching records.
Updates

Information on Current and Future States of Cybersecurity in the Digital Economy

August 10, 2016
https://csrc.nist.gov/news/2016/information-on-state-of-cybersecurity-in-the-digit

The Commission on Enhancing National Cybersecurity requests information about current and future states of cybersecurity in the digital economy.

Publications SP 800-182 (Final)

Computer Security Division 2015 Annual Report

August 10, 2016
https://csrc.nist.gov/pubs/sp/800/182/final

Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The prim...

Publications SP 800-46 Rev. 2 (Final)

Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security

July 29, 2016
https://csrc.nist.gov/pubs/sp/800/46/r2/final

Abstract: For many organizations, their employees, contractors, business partners, vendors, and/or others use enterprise telework or remote access technologies to perform work from external locations. All components of these technologies, including organization-issued and bring your own device (BYOD) client d...

Publications SP 800-114 Rev. 1 (Final)

User's Guide to Telework and Bring Your Own Device (BYOD) Security

July 29, 2016
https://csrc.nist.gov/pubs/sp/800/114/r1/final

Abstract: Many people telework, and they use a variety of devices, such as desktop and laptop computers, smartphones, and tablets, to read and send email, access websites, review and edit documents, and perform many other tasks. Each telework device is controlled by the organization, a third party (such as th...

Publications IR 8080 (Final)

Usability and Security Considerations for Public Safety Mobile Authentication

July 27, 2016
https://csrc.nist.gov/pubs/ir/8080/final

Abstract: There is a need for cybersecurity capabilities and features to protect the Nationwide Public Safety Broadband Network (NPSBN). However, cybersecurity requirements should not compromise the ability of first responders to complete their missions. In addition, the diversity of public safety disciplines...

Updates

Open Meeting of the Commission on Enhancing National Cybersecurity

July 15, 2016
https://csrc.nist.gov/news/2016/commission-on-enhancing-national-cybersecurity-(au

The Commission on Enhancing National Cybersecurity will meet Tuesday, August 23, 2016, from 9:00 a.m. until 5:00 p.m. Central Time at the University of Minnesota's TCF Bank Stadium-DQ Club Room.

Events

Open Meeting of the Commission on Enhancing National Cybersecurity - July 2016

July 14, 2016
https://csrc.nist.gov/events/2016/open-meeting-of-the-commission-on-enhancing-na-(2)

The Commission on Enhancing National Cybersecurity will meet Thursday, July 14, 2016, from 9:00 a.m. until 5:00 p.m. Central Time at the Hilton University of Houston. The primary purpose of the meeting is to discuss the challenges and opportunities facing cybersecurity for critical infrastructure, as well as State and local governments and cybersecurity. In particular, the meeting will address: (1) Current and future effects of critical infrastructure on the digital economy; (2) critical infrastructure cybersecurity challenges affecting the digital economy; and (3) cybersecurity challenges and...

Updates

Open Meeting of the Commission on Enhancing National Cybersecurity

July 5, 2016
https://csrc.nist.gov/news/2016/commission-on-enhancing-national-cybersecurity-(ju

The Commission on Enhancing National Cybersecurity will meet Thursday, July 14, 2016, from 9:00 a.m. until 5:00 p.m. Central Time at the Hilton University of Houston.

Publications Journal Article (Final)

Metamorphic Testing for Cybersecurity

June 27, 2016
https://csrc.nist.gov/pubs/journal/2016/06/metamorphic-testing-for-cybersecurity/final

Journal: Computer (IEEE Computer) Abstract: Metamorphic testing (MT) can enhance security testing by providing an alternative to using a test oracle, which is often unavailable or impractical. The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that software...

Updates

NIST Released Summary of Cybersecurity Framework Workshop 2016

June 9, 2016
https://csrc.nist.gov/news/2016/nist-released-summary-of-cybersecurity-framework-w

NIST published a summary of observations from Cybersecurity Framework Workshop 2016 held at NIST in Gaithersburg, Maryland on 6 and 7 April 2016. The summary highlights areas of agreement between workshop participants and respondents to the most recent request for information (RFI),...

Updates

NIST Released DRAFT Special Publication 800-184, Guide for Cybersecurity Event Recovery

June 6, 2016
https://csrc.nist.gov/news/2016/nist-released-draft-special-publication-800-184

NIST is proud to announce the release of Draft Special Publication 800-184, Guide for Cybersecurity Event Recovery. The purpose of this document is to support federal agencies in a technology-neutral way in improving their cyber event recovery plans, processes, and procedures...

Updates

Open Meeting of the Commission on Enhancing National Cybersecurity

June 3, 2016
https://csrc.nist.gov/news/2016/commission-on-enhancing-national-cybersecurity-(1)

The Commission on Enhancing National Cybersecurity will meet Tuesday, June 21, 2016, from 8:30 a.m. until 5:00 p.m. Pacific Time at the University of California, Berkeley in the Chevron Auditorium at the International House.

Updates

National Cybersecurity Center of Excellence Data Integrity Building Block

June 1, 2016
https://csrc.nist.gov/news/2016/national-cybersecurity-center-of-excellence-data-i

The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Data Integrity Building Block.

Publications IR 8135 (Final)

Identifying and Categorizing Data Types for Public Safety Mobile Applications: Workshop Report

June 1, 2016
https://csrc.nist.gov/pubs/ir/8135/final

Abstract: The Association of Public-Safety Communications (APCO), in cooperation with FirstNet and the Department of Commerce held a half-day workshop on June 2nd 2015 titled “Identifying and Categorizing Data Types for Public Safety Mobile Applications.” The goal of this workshop was to begin identifying dif...

Publications Journal Article (Final)

Insights on Formal Methods of Cybersecurity

May 27, 2016
https://csrc.nist.gov/pubs/journal/2016/05/insights-on-formal-methods-of-cybersecurity/final

Journal: Computer (IEEE Computer) Abstract: We asked 7 experts 1 simple question to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems: Please summarize in a paragraph the state of the research and practitioner communities in formal method as you see it. Please include standards, c...

Publications ITL Bulletin (Final)

Combinatorial Testing for Cybersecurity and Reliability

May 12, 2016
https://csrc.nist.gov/pubs/itlb/2016/05/combinatorial-testing-for-cybersecurity-and-reliab/final

Abstract: This bulletin focuses on NIST's combinatorial testing work. Combinatorial testing is a proven method for more effective software testing at lower cost. The key insight underlying combinatorial testing's effectiveness resulted from a series of studies by NIST from 1999 to 2004. NIST research showed...

Publications Project Description (Initial Public Draft)

Securing Non-Credit Card, Sensitive Consumer Data: Consumer Data Security for the Retail Sector

May 9, 2016
https://csrc.nist.gov/pubs/pd/2016/05/09/securing-sensitive-consumer-data-noncc/ipd

Abstract: As a result of payment card industry standards and a strong understanding of the value of valid credit card information in the black market, the retail industry has already invested in security mechanisms to protect credit card data, also referred to as cardholder data. However, this cardholder data...

Publications Project Description (Final)

Data Integrity: Recovering from a destructive malware attack

May 9, 2016
https://csrc.nist.gov/pubs/pd/2016/05/09/data-integrity-recovering-from-malware/final

Abstract: Threats of destructive malware, malicious insider activity, and even honest mistakes create the imperative for organizations to be able to quickly recover from an event that alters or destroys any form of data (database records, system files, configurations, user files, application code, etc.). Orga...

Updates

Open Meeting of the Commission on Enhancing National Cybersecurity

May 6, 2016
https://csrc.nist.gov/news/2016/commission-on-enhancing-national-cybersecurity-(ma

The Commission on Enhancing National Cybersecurity (the “Commission”) will meet Monday, May 16, 2016, from 9:00 a.m. until 4:00 p.m. Eastern Time in Vanderbilt Hall at the New York University (NYU) School of Law

Updates

The Information Security and Privacy Advisory Board welcomes New Chair Christopher Boyer

April 26, 2016
https://csrc.nist.gov/news/2016/the-ispab-welcome-new-chair

A new chair, Christopher Boyer, was appointed to the National Institute of Standards and Technology (NIST) Information Security and Privacy Advisory Board (ISPAB). ...

Updates

NIST Released the final version of NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags

April 25, 2016
https://csrc.nist.gov/news/2016/nist-released-the-final-version-of-nistir-8060

NIST is pleased to announce the release of NIST Interagency Report (NISTIR) 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags. This report provides an overview of the capabilities and usage of Software Identification (SWID)...

Updates

NIST requests comments on the second draft of Special Publication (SP) 800-150, Guide to Cyber Threat Information Sharing

April 21, 2016
https://csrc.nist.gov/news/2016/requests-comments-second-draft-of-sp-800-150

NIST requests comments on the Second Draft of Special Publication (SP) 800-150, Guide to Cyber Threat Information Sharing. This draft provides guidelines for establishing, participating in, and maintaining cyber threat information sharing relationships...

Publications CSWP 4 (Final)

Best Practices for Privileged User PIV Authentication

April 21, 2016
https://csrc.nist.gov/pubs/cswp/4/best-practices-for-privileged-user-piv-authenticat/final

Abstract: The Cybersecurity Strategy and Implementation Plan (CSIP), published by the Office of Management and Budget (OMB) on October 30, 2015, requires that federal agencies use Personal Identity Verification (PIV) credentials for authenticating privileged users. This will greatly reduce unauthorized access...

Updates

NIST Announces Release of Draft NISTIR 8071, LTE Architecture Overview and Security Analysis

April 12, 2016
https://csrc.nist.gov/news/2016/nist-announces-release-of-draft-nistir-8071

NIST requests comments on Draft NIST Internal Report (NISTIR) 8071, LTE Architecture Overview and Security Analysis. Cellular technology plays an increasingly large role in society as it has become the primary portal to the Internet for a large segment of the population. ...

<< first   < previous   26     27     28     29     30     31     32     33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50  next >  last >>