Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1176 through 1200 of 1415 matching records.
Events

FISSEA 29th Annual Conference

March 15, 2016 - March 16, 2016
https://csrc.nist.gov/events/2016/fissea-29th-annual-conference

29th Annual Conference March 15-16, 2016 The Quest for the Un-hackable Human: The Power of Cybersecurity Awareness and Training FISSEA Agenda with Presentation Links Conference Program Program focus: Awareness, Training, Education, and Certification issues New techniques for developing and conducting effective, meaningful training Workforce development Cybersecurity governance IG Metrics Internet of Things Social networking - social media Continuous Diagnostics and Mitigation (CDM) Training for the trainers Attendees gain: Big impact for low cost Networking opportunities...

Publications IR 8054 (Final)

NSTIC Pilots: Catalyzing the Identity Ecosystem

March 15, 2016
https://csrc.nist.gov/pubs/ir/8054/upd1/final

Abstract: Pilots are an integral part of the National Strategy for Trusted Identities in Cyberspace (NSTIC), issued by the White House in 2011 to encourage enhanced security, privacy, interoperability, and ease of use for online transactions. This document details summaries and outcomes of NSTIC pilots; in ad...

Publications SP 800-154 (Initial Public Draft)

Guide to Data-Centric System Threat Modeling

March 14, 2016
https://csrc.nist.gov/pubs/sp/800/154/ipd

Abstract: Threat modeling is a form of risk assessment that models aspects of the attack and defense sides of a particular logical entity, such as a piece of data, an application, a host, a system, or an environment. This publication examines data-centric system threat modeling, which is threat modeling that...

Publications Project Description (Final)

Domain Name System-Based Security for Electronic Mail

March 4, 2016
https://csrc.nist.gov/pubs/pd/2016/03/04/domain-name-systembased-security-for-electronic-ma/final

Abstract: The Domain Name System-Based Security for Electronic Mail project will produce a proof of concept security platform that will demonstrate trustworthy email exchanges across organizational boundaries. The product of the project will include authentication of mail servers, signing and encryption of em...

Updates

NIST Announces Release of Draft NISTIR 8103, Advanced Identity Workshop on Applying Measurement Science in the Identity Ecosystem: Summary and Next Steps

February 17, 2016
https://csrc.nist.gov/news/2016/nist-announces-release-of-draft-nistir-8103

On January 12-13, 2016 the Applied Cybersecurity Division (ACD) in the National Institute of Standards and Technology’s (NIST) Information Technology Laboratory hosted the “Applying Measurement Science in the Identity Ecosystem”...

Publications ITL Bulletin (Final)

Implementing Trusted Geolocation Services in the Cloud

February 17, 2016
https://csrc.nist.gov/pubs/itlb/2016/02/implementting-trusted-geolocation-services-in-the/final

Abstract: The bulletin summarizes the information presented in NISTIR 7904, "Trusted Geolocation in the Cloud: Proof of Concept Implementation". The publication explains security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation.

Updates

Views on the Framework for Improving Critical Infrastructure Cybersecurity

February 12, 2016
https://csrc.nist.gov/news/2016/framework-for-improving-critical-infrastructure-cy

The National Institute of Standards and Technology (NIST) is extending the period for submitting comments relating to the “Framework for Improving Critical Infrastructure Cybersecurity

Updates

A NIST Draft Whitepaper titled "Best Practices for Privileged User PIV Authentication" is available for public comment.

February 5, 2016
https://csrc.nist.gov/news/2016/bp-for-privileged-user-piv-authentication-publi

This draft white paper is a best practices guide. The paper is in response to the Cybersecurity Strategy and Implementation Plan (CSIP), published by the Office of Management and Budget (OMB) ...

Publications Journal Article (Final)

Learning Internet of Things Security "Hands-On"

February 3, 2016
https://csrc.nist.gov/pubs/journal/2016/02/learning-internet-of-things-security-handson/final

Journal: IEEE Security & Privacy Abstract: What can you glean from using inexpensive, off-the-shelf parts to create Internet of Things (IoT) use cases? As it turns out, a lot. The fast productization of IoT technologies is leaving users vulnerable to security and privacy risks.

Updates

National Cybersecurity Center of Excellence (NCCoE) Wireless Medical Infusion Pumps Use Case for the Health Care Sector

January 25, 2016
https://csrc.nist.gov/news/2016/nccoe-wireless-medical-infusion-pumps-use-case

The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Wireless Medical Infusion Pumps use case for the health care sector.

Updates

Influence the Future of Cybersecurity Education—Join the NICE Working Group

January 21, 2016
https://csrc.nist.gov/news/2016/influence-the-future-of-cybersecurity-education

Addressing the nation’s rapidly increasing need for cybersecurity employees, the National Initiative for Cybersecurity Education (NICE) is seeking members from the public and private sectors and ...

Publications IR 8055 (Final)

Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research

January 20, 2016
https://csrc.nist.gov/pubs/ir/8055/final

Abstract: This report documents proof of concept research for Derived Personal Identity Verification (PIV) Credentials. Smart card-based PIV Cards cannot be readily used with most mobile devices, such as smartphones and tablets, but Derived PIV Credentials (DPCs) can be used instead to PIV-enable these device...

Publications ITL Bulletin (Final)

Securing Interactive and Automated Access Management Using Secure Shell (SSH)

January 11, 2016
https://csrc.nist.gov/pubs/itlb/2016/01/securing-interactive-and-automated-access-manageme/final

Abstract: This bulletin summarizes the information presented in NISTIR 7966, "Security of Interactive and Automated Access Management Using Secure Shell (SSH)." The publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on th...

Publications IR 8074 Vol. 2 (Final)

Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity

December 23, 2015
https://csrc.nist.gov/pubs/ir/8074/v2/final

Abstract: This report provides background information and analysis in support of NISTIR 8074 Volume 1, "Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity." It provides a current summary of ongoing activities in critical int...

Publications IR 8074 Vol. 1 (Final)

Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity

December 23, 2015
https://csrc.nist.gov/pubs/ir/8074/v1/final

Abstract: This interagency report sets out proposed United States Government (USG) strategic objectives for pursuing the development and use of international standards for cybersecurity and makes recommendations to achieve those objectives. The recommendations cover interagency coordination, collaboration wit...

Publications ITL Bulletin (Final)

Stopping Malware and Unauthorized Software through Application Whitelisting

December 15, 2015
https://csrc.nist.gov/pubs/itlb/2015/12/stopping-malware-and-unauthorized-software-through/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication 800-167, "Guide to Application Whitelisting," written by Adam Sedgewick, Murugiah Souppaya and Karen Scarfone. The publication is intended to assist organizations in understanding the basics of application whitelisting....

Updates

Request for Information on the Cybersecurity Framework

December 11, 2015
https://csrc.nist.gov/news/2015/request-for-information-on-the-cybersecurity-frame

NIST releases a third Cybersecurity Framework Request for Information (RFI), Views on the Framework for Improving Critical Infrastructure Cybersecurity, requesting information* about...

Updates

Views on the Framework for Improving Critical Infrastructure Cybersecurity

December 11, 2015
https://csrc.nist.gov/news/2015/views-on-the-framework-for-improving-critical-infr

NIST is seeking information on the “Framework for Improving Critical Infrastructure Cybersecurity” (the “Framework”).

Publications IR 7904 (Final)

Trusted Geolocation in the Cloud: Proof of Concept Implementation

December 10, 2015
https://csrc.nist.gov/pubs/ir/7904/final

Abstract: This publication explains selected security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. It then describes a proof of concept implementation that was designed to address those challenges. The publication provides sufficient details about the p...

<< first   < previous   33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57  next >  last >>