Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1126 through 1150 of 1415 matching records.
Events

FCSM Forum - Oct 2017

October 26, 2016 - October 26, 2016
https://csrc.nist.gov/events/2016/federal-computer-security-managers-forum-octobe

Presentations & Speakers at a Glance: National Cybersecurity Center of Excellence (NCCoE) Overview, Bill Newhouse, NIST; Developing ISCM Assessment Methodology, Chad Baer, DHS. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND THEIR DESIGNATED SUPPORT CONTRACTORS. REGISTRANTS MUST USE A .GOV, .EDU, OR .MIL ADDRESS FOR SIGN-UP. SUPPORT CONTRACTORS MUST INDICATE THE AGENCY OR ORGANIZATION THEY SUPPORT. The Federal Computer Security Program Managers Forum (the "Forum") is an informal group sponsored by the National Institute of Standards...

Publications Conference Paper (Final)

Limiting The Impact of Stealthy Attacks on Industrial Control Systems

October 24, 2016
https://csrc.nist.gov/pubs/conference/2016/10/24/limiting-the-impact-of-stealthy-attacks-on-ics/final

Conference: 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) Abstract: While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Att...

Publications ITL Bulletin (Final)

Making Email Trustworthy

October 24, 2016
https://csrc.nist.gov/pubs/itlb/2016/10/making-email-trustworthy/final

Abstract: This bulletin summarizes the information presented in NIST SP 800-177, Trustworthy Email. This publication gives recommendations and guidelines for enhancing trust in email. This guideline applies to federal IT systems and will also be useful for any small or medium sized organizations.

Events

2016 HIPAA Conference

October 19, 2016 - October 20, 2016
https://csrc.nist.gov/events/2016/safeguarding-health-information-building-assuranc

NIST and the Department of Health and Human Services (HHS), Office for Civil Rights (OCR) are pleased to co-host the 9th annual conference, Safeguarding Health Information: Building Assurance through HIPAA Security, on October 19-20, 2016 at the Capital Hilton, Washington, D.C. The conference will explore the current healthcare cybersecurity landscape and the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. This event will highlight the present state of healthcare cybersecurity, and practical strategies, tips and techniques for implementing the HIPAA Security Rule....

Updates

NIST Released 2 Special Publications - Special Publication 800-178 and Special Publication 800-150

October 5, 2016
https://csrc.nist.gov/news/2016/special-publication-800-178-and-special-publicatio

Special Publication 800-178, A Comparison of ABAC Standards for Data Service Applications: XACML and NGAC and Special Publication 800-150, Guide to Cyber Threat Information Sharing ...

Updates

NIST Announce the Release of DRAFT NISTIR 8151, Dramatically Reducing Software Vulnerabilities: Report to the White House Office of Science and Technology Policy

October 4, 2016
https://csrc.nist.gov/news/2016/nist-announce-the-release-of-draft-nistir-8151

NIST invites comments on Draft NIST Interagency Report (NISTIR) 8151, Dramatically Reducing Software Vulnerabilities -- Report to the White House Office of Science and Technology Policy.

Publications SP 800-150 (Final)

Guide to Cyber Threat Information Sharing

October 4, 2016
https://csrc.nist.gov/pubs/sp/800/150/final

Abstract: Cyber threat information is any information that can help an organization identify, assess, monitor, and respond to cyber threats. Cyber threat information includes indicators of compromise; tactics, techniques, and procedures used by threat actors; suggested actions to detect, contain, or prevent a...

Updates

Open Meeting of the Information Security and Privacy Advisory Board (ISPAB)

September 28, 2016
https://csrc.nist.gov/news/2016/open-meeting-of-the-ispab

The Information Security and Privacy Advisory Board (ISPAB) will meet October 26-28, 2016. All sessions will be open to the public.

Publications Project Description (Final)

Multifactor Authentication for e-Commerce: Online Authentication for the Retail Sector

September 20, 2016
https://csrc.nist.gov/pubs/pd/2016/09/20/multifactor-authentication-for-ecommerce/final

Abstract: As greater security control mechanisms are implemented at the point of sale, retailers in the U.S. may see a drastic increase in e-commerce fraud, similar to what has been widely observed in the United Kingdom and Europe following the rollout of Europay, MasterCard, and Visa (EMV) chip-and-PIN techn...

Events

Open Meeting of the Commission on Enhancing National Cybersecurity - September 2016

September 19, 2016
https://csrc.nist.gov/events/2016/open-meeting-of-the-commission-on-enhancing-nation

The Commission on Enhancing National Cybersecurity will meet Monday, September 19, 2016 from 9:00 a.m. until 5:00 p.m. Eastern Time at the American University Washington College of Law, Claudio Grossman Hall, Yuma Building. The primary purpose of the meeting is to discuss the challenges and opportunities for organizations and consumers in securing the digital economy. In particular, the meeting will address: (1) International concerns; (2) review of current state of cybersecurity; (3) growing and securing the digital economy; and (4) innovation and technology in the government. The meeting...

Publications IR 8103 (Final)

Advanced Identity Workshop on Applying Measurement Science in the Identity Ecosystem: Summary and Next Steps

September 19, 2016
https://csrc.nist.gov/pubs/ir/8103/final

Abstract: On January 12-13, 2016 the National Institute of Standards and Technology’s (NIST) Applied Cybersecurity Division (ACD) hosted the “Applying Measurement Science in the Identity Ecosystem” workshop to discuss the application of measurement science to digital identity management. This document summari...

Updates

NIST Releases Baldrige Cybersecurity Excellence Builder for Public Comment

September 15, 2016
https://csrc.nist.gov/news/2016/nist-releases-baldrige-cybersecurity-excellence-bu

NIST has released a draft of the Baldridge Cybersecurity Excellence Builder, a self-assessment tool to help organizations better understand the effectiveness of their cybersecurity risk management efforts.

Updates

DRAFT [Project Description] Authentication for Law Enforcement Vehicle Systems

September 13, 2016
https://csrc.nist.gov/news/2016/draft-authentication-for-law-enforcement-vehicle-s

The National Cybersecurity Center of Excellence (NCCoE) has posted a draft Project Description on the topic of Authentication for Law Enforcement Vehicle Systems.

Publications Project Description (Initial Public Draft)

Authentication for Law Enforcement Vehicle Systems

September 13, 2016
https://csrc.nist.gov/pubs/pd/2016/09/13/authentication-for-law-enforcement-vs/ipd

Abstract: Law enforcement vehicles often serve as mobile offices. In-vehicle laptops or other computer systems are used to access a wide range of software applications and databases hosted and operated by federal, state, and local agencies, with each typically requiring a different username and password. This...

Updates

DRAFT White Paper - Cybersecurity Framework Manufacturing Profile

September 7, 2016
https://csrc.nist.gov/news/2016/draft-cybersecurity-framework-manufacturing-prof

A draft manufacturing implementation of the Cybersecurity Framework ("Profile") has been developed to establish a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices.

Events

Open Meeting of the Commission on Enhancing National Cybersecurity - August 2016

August 23, 2016
https://csrc.nist.gov/events/2016/open-meeting-of-the-commission-on-enhancing-na-(1)

The Commission on Enhancing National Cybersecurity will meet Tuesday, August 23, 2016, from 9:00 a.m. until 5:00 p.m. Central Time at the University of Minnesota's TCF Bank Stadium-DQ Club Room. The primary purpose of the meeting is to discuss the challenges and opportunities for organizations and consumers in securing the digital economy. In particular, the meeting will address: (1) Challenges confronting consumers in the digital economy; (2) innovation (Internet of Things, healthcare, and other areas); and (3) assured products and services. The meeting will support detailed recommendations...

Updates

Information on Current and Future States of Cybersecurity in the Digital Economy

August 10, 2016
https://csrc.nist.gov/news/2016/information-on-state-of-cybersecurity-in-the-digit

The Commission on Enhancing National Cybersecurity requests information about current and future states of cybersecurity in the digital economy.

Publications SP 800-182 (Final)

Computer Security Division 2015 Annual Report

August 10, 2016
https://csrc.nist.gov/pubs/sp/800/182/final

Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The prim...

Publications SP 800-46 Rev. 2 (Final)

Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security

July 29, 2016
https://csrc.nist.gov/pubs/sp/800/46/r2/final

Abstract: For many organizations, their employees, contractors, business partners, vendors, and/or others use enterprise telework or remote access technologies to perform work from external locations. All components of these technologies, including organization-issued and bring your own device (BYOD) client d...

Publications SP 800-114 Rev. 1 (Final)

User's Guide to Telework and Bring Your Own Device (BYOD) Security

July 29, 2016
https://csrc.nist.gov/pubs/sp/800/114/r1/final

Abstract: Many people telework, and they use a variety of devices, such as desktop and laptop computers, smartphones, and tablets, to read and send email, access websites, review and edit documents, and perform many other tasks. Each telework device is controlled by the organization, a third party (such as th...

Publications IR 8080 (Final)

Usability and Security Considerations for Public Safety Mobile Authentication

July 27, 2016
https://csrc.nist.gov/pubs/ir/8080/final

Abstract: There is a need for cybersecurity capabilities and features to protect the Nationwide Public Safety Broadband Network (NPSBN). However, cybersecurity requirements should not compromise the ability of first responders to complete their missions. In addition, the diversity of public safety disciplines...

<< first   < previous   33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57  next >  last >>