Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1226 through 1250 of 1412 matching records.
Updates

National Cybersecurity Center of Excellence, Derived Personal Identity Verification Credentials Building Block

August 14, 2015
https://csrc.nist.gov/news/2015/nccoe-derived-piv-credentials-building-block

NIST invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Derived PIV Credentials Building Block.

Updates

National Cybersecurity Center of Excellence, Mobile Device Security Building Block

August 14, 2015
https://csrc.nist.gov/news/2015/nccoe-mobile-device-security-building-block

The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Mobile Device Security Building Block.

Updates

NIST Announces the Release of Draft NIST Interagency Report (NISTIR) 8074, Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity

August 10, 2015
https://csrc.nist.gov/news/2015/nist-announces-the-release-of-draft-nistir-8074

NIST seeks public comments on Draft NIST Interagency Report (NISTIR) 8074, which comprises two volumes, "Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity" (Vol. 1) and "Supplemental Information" (Vol. 2).

Publications Conference Paper (Final)

Human Generated Passwords -- The Impacts of Password Requirements and Presentation Styles

August 2, 2015
https://csrc.nist.gov/pubs/conference/2015/08/02/human-generated-passwords-impacts-of-password-requ/final

Conference: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Abstract: The generation stage of the user password management lifecycle is arguably the most important yet perilous step. Fulfilling minimum length and character type requirements while attempting to create something memorable can become an arduous task, leaving the users frustrated and confused. Our study f...

Publications Conference Paper (Final)

What 4,500+ People Can Tell You: Employees' Attitudes Toward Organizational Password Policy Do Matter

August 2, 2015
https://csrc.nist.gov/pubs/conference/2015/08/02/what-4500-people-can-tell-you-employees-attitu-(1)/final

Conference: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Abstract: Organizations establish policies on how employees should generate, maintain, and use passwords to authenticate and gain access to the organization’s information systems. This paper focuses on employees’ attitudes towards organizational password policies and examines the impacts on their work-related...

Updates

Now available: NIST Draft Cybersecurity Practice Guide, Special Publication 1800-1: Securing Electronic Health Records on Mobile Devices

July 29, 2015
https://csrc.nist.gov/news/2015/nist-draft-cybersecurity-practice-guide,-sp-1800-1

The use of mobile devices in health care sometimes outpaces the privacy and security protections on those devices. Stolen personal information can have negative financial impacts, ...

Updates

Second Draft NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags

July 22, 2015
https://csrc.nist.gov/news/2015/2nd-draft-nistir-8060,-guidelines-for-the-creation

NIST is pleased to announce the second public comment release of NIST Internal Report (NISTIR) 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags.

Events

ISPAB June 2015 Meeting

June 10, 2015 - June 12, 2015
https://csrc.nist.gov/events/2015/ispab-june-2015-meeting

(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Wednesday, June 10 Information Technology Laboratory (ITL) Realignment and Proposed Applied Cybersecurity Division Donna Dodson, NIST National Initiative for Cybersecurity Education (NICE) Updates Rodney Petersen, Lead NICE, NIST IG Reporting on FISMA Gale Stone, (Moderator), SSA Dr. Brett M. Baker, National Science Foundation Peter J. Sheridan, Federal Reserve Board Vehicle Infrastructure (Auto-manufacturer Communication and Usability): Discussion on Data Security and Privacy Andrew...

Updates

DRAFT NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags

May 29, 2015
https://csrc.nist.gov/news/2015/draft-nistir-8060,-guidelines-for-the-creation-of

NIST is pleased to announce the public comment release of NIST Internal Report (NISTIR) 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags.

Updates

Draft NISTIR 8062, Privacy Risk Management for Federal Information Systems

May 29, 2015
https://csrc.nist.gov/news/2015/draft-nistir-8062,-privacy-risk-management

NIST requests comments on the draft report NISTIR 8062, Privacy Risk Management for Federal Information Systems, which describes a privacy risk management framework for federal information systems.

Updates

NIST is pleased to announce the release of NIST Internal Report (NIST IR) 8041, Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium

April 15, 2015
https://csrc.nist.gov/news/2015/nist-announces-the-release-of-nistir-8041

NIST IR 8041, Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium is now available. Direct Digital Manufacturing involves fabricating physical objects from a data file using

Publications IR 8054 (Final) (Withdrawn)

NSTIC Pilots: Catalyzing the Identity Ecosystem

April 13, 2015

https://csrc.nist.gov/pubs/ir/8054/final

Abstract: Pilots are an integral part of the National Strategy for Trusted Identities in Cyberspace (NSTIC), passed by the White House in 2011 to encourage enhanced security, privacy, interoperability, and ease of use for online transactions. This document details summaries and outcomes of NSTIC pilots; in ad...

Publications IR 8041 (Final)

Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium

April 10, 2015
https://csrc.nist.gov/pubs/ir/8041/final

Abstract: Direct Digital Manufacturing (DDM) involves fabricating physical objects from a data file using computer-controlled processes with little to no human intervention. It includes Additive Manufacturing (AM), 3D printing, rapid prototyping, etcetera. The technology is advancing rapidly and has the poten...

Events

Workshop on Cybersecurity in a Post-Quantum World

April 2, 2015 - April 3, 2015
https://csrc.nist.gov/events/2015/workshop-on-cybersecurity-in-a-post-quantum-world

Full Workshop Details The advent of practical quantum computing will break all commonly used public key cryptographic algorithms. In response, NIST is researching cryptographic algorithms for public key-based key agreement and digital signatures that are not susceptible to cryptanalysis by quantum algorithms. NIST is holding this workshop to engage academic, industry, and government stakeholders. The Post Quantum Workshop will be held on April 2-3, 2015, immediately following the 2015 International Conference on Practice and Theory of Public-Key Cryptography. NIST seeks to discuss issues...

Updates

DRAFT Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations

April 2, 2015
https://csrc.nist.gov/news/2015/draft-special-publication-800-171

NIST announces the release of Special Publication 800-171, Protecting Controlled Unclassified Information in Non-federal Information Systems and Organizations (Final Public Draft). (NOTE: This draft has been since approved as final as of June 2015)

Publications Project Description (Final)

Attribute Based Access Control

April 1, 2015
https://csrc.nist.gov/pubs/pd/2015/04/01/attribute-based-access-control/final

Abstract: Enterprises rely upon strong access control mechanisms to ensure that corporate resources (e.g. applications, networks, systems and data) are not exposed to anyone other than an authorized user. As business requirements change, enterprises need highly flexible access control mechanisms that can adap...

<< first   < previous   33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57  next >  last >>