Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1201 through 1225 of 1408 matching records.
Publications SP 800-167 (Final)

Guide to Application Whitelisting

October 28, 2015
https://csrc.nist.gov/pubs/sp/800/167/final

Abstract: An application whitelist is a list of applications and application components that are authorized for use in an organization. Application whitelisting technologies use whitelists to control which applications are permitted to execute on a host. This helps to stop the execution of malware, unlicensed...

Publications SP 1500-4 (Final) (Withdrawn)

NIST Big Data Interoperability Framework: Volume 4, Security and Privacy Version 1

October 22, 2015

https://csrc.nist.gov/pubs/sp/1500/4/final

Abstract: Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is outpacing scientific and technological advances...

Events

ISPAB October 2015 Meeting

October 21, 2015 - October 23, 2015
https://csrc.nist.gov/events/2015/ispab-october-2015-meeting

(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Wednesday, October 21 NIST and NSA Future Plans for Quantum Resistant Cryptography Vincent M. Boyle, NSA Lily Chen, Computer Security Division, NIST Adrian Stanger, NSA Federal Government Cybersecurity: The 30-day Cybersecurity Sprint and the Marathon to Come Chris DeRusha, Office of Management and Budget (OMB) Presentation from National Highway Traffic Safety Administration (NHTSA) Cem Hatipoglu, National Highway Traffic Safety Administration (NHTSA) Discussion on Due Diligence on Cybersecurity,...

Publications IR 7966 (Final)

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

October 15, 2015
https://csrc.nist.gov/pubs/ir/7966/final

Abstract: Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges, for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management, and dynamic cloud provisioning. This is ofte...

Events

Best Practices in Cyber Supply Chain Risk Management

October 1, 2015 - October 2, 2015
https://csrc.nist.gov/events/2015/best-practices-in-cyber-supply-chain-risk-manageme

Full Details (Agenda, Case Studies & Workshop Briefings) On October 1-2, 2015, NIST will host a workshop to share information on Best Practices in Cyber Supply Chain Risk Management, which will provide insights on: State of practice in several industry sectors; Currently used tools, standards, and best practices; How to establish a business case for integrating cyber supply chain risk management into organization's overall risk management processes; How to communicate cyber supply chain concerns to executive leadership; Synergies between quality, continuity, cybersecurity and other...

Updates

NIST Cybersecurity Practice Guide, Draft Special Publication 1800-3: "Attribute Based Access Control"

October 1, 2015
https://csrc.nist.gov/news/2015/nist-cybersecurity-practice-guide

NIST requests public comments on Draft NIST Cybersecurity Practice Guide 1800-3, Attribute Based Access Control.

Events

2015 Cybersecurity Innovation Forum

September 9, 2015 - September 11, 2015
https://csrc.nist.gov/events/2015/2015-cybersecurity-innovation-forum

The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, with participation from the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing. The technical program covers four tracks: Trusted Computing Security Automation Cyber Information Sharing Research Tracks include lectures, panel...

Updates

(THIRD Draft) NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags

August 31, 2015
https://csrc.nist.gov/news/2015/(third-draft)-nistir-8060

NIST is pleased to announce the third public comment release of NIST Internal Report (NISTIR) 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags.

Updates

NIST is proud to announce the release of DRAFT Special Publication 1800-2, Identity and Access Management for Electric Utilities

August 26, 2015
https://csrc.nist.gov/news/2015/nist-announces-the-release-of-draft-special-public

NIST's National Cybersecurity Center of Excellence (NCCoE) has released a draft of the latest NIST Cybersecurity Practice Guide, Draft Special Publication (SP) 1800-2, Identity and Access Management for Electric Utilities.

Publications SP 800-176 (Final)

Computer Security Division 2014 Annual Report

August 20, 2015
https://csrc.nist.gov/pubs/sp/800/176/final

Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The prim...

Updates

National Cybersecurity Center of Excellence, Attribute Based Access Control Building Block

August 14, 2015
https://csrc.nist.gov/news/2015/nccoe-attribute-based-access-control-building-bloc

The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Attribute Based Access Control Building Block.

Updates

National Cybersecurity Center of Excellence, Derived Personal Identity Verification Credentials Building Block

August 14, 2015
https://csrc.nist.gov/news/2015/nccoe-derived-piv-credentials-building-block

NIST invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Derived PIV Credentials Building Block.

Updates

National Cybersecurity Center of Excellence, Mobile Device Security Building Block

August 14, 2015
https://csrc.nist.gov/news/2015/nccoe-mobile-device-security-building-block

The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Mobile Device Security Building Block.

Updates

NIST Announces the Release of Draft NIST Interagency Report (NISTIR) 8074, Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity

August 10, 2015
https://csrc.nist.gov/news/2015/nist-announces-the-release-of-draft-nistir-8074

NIST seeks public comments on Draft NIST Interagency Report (NISTIR) 8074, which comprises two volumes, "Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity" (Vol. 1) and "Supplemental Information" (Vol. 2).

Publications Conference Paper (Final)

Human Generated Passwords -- The Impacts of Password Requirements and Presentation Styles

August 2, 2015
https://csrc.nist.gov/pubs/conference/2015/08/02/human-generated-passwords-impacts-of-password-requ/final

Conference: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Abstract: The generation stage of the user password management lifecycle is arguably the most important yet perilous step. Fulfilling minimum length and character type requirements while attempting to create something memorable can become an arduous task, leaving the users frustrated and confused. Our study f...

<< first   < previous   33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57  next >  last >>