Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1326 through 1350 of 1412 matching records.
Updates

National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health Information Demonstration Project

March 15, 2013
https://csrc.nist.gov/news/2013/nccoe-secure-exchange-of-electronic-health-informa

The National Institute of Standards and Technology (NIST) is extending the deadline for submission of certification letters in order to allow additional time for partners and organizations to provide products and…

Updates

Developing a Framework To Improve Critical Infrastructure Cybersecurity

February 26, 2013
https://csrc.nist.gov/news/2013/developing-a-framework-to-improve-critical-infrast

The National Institute of Standards and Technology (NIST) is conducting a comprehensive review to develop a framework to reduce cyber risks to critical infrastructure

Publications IR 7916 (Final)

Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012

February 15, 2013
https://csrc.nist.gov/pubs/ir/7916/final

Abstract: Proceedings of the Cybersecurity in Cyber-Physical Workshop, April 23 – 24, 2012, complete with abstracts and slides from presenters. Some of the cyber-physical systems covered during the first day of the workshop included networked automotive vehicles, networked medical devices, semi-conductor manu...

Events

ISPAB: FEBRUARY 2013 MEETING

February 13, 2013 - February 15, 2013
https://csrc.nist.gov/events/2013/ispab-february-2013-meeting

(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Update on Administrative Priorities for Cybersecurity Policy - 2 handouts (PDF files) Handout #1 Handout #2 Agency IG Audit and Compliance Discussion of Annual FISMA Report, Overall Progress and Current/Future Priorities Carol Bales, Office of Management and Budget (OMB) GAO’s View of FISMA Anjalique Lawrence, Assistant Director, U.S. Government Accountability Office (GAO) DHS/Federal Network Security :FISMA Metrics Deep Dive David Waltermire, ITL, Computer Security Division, NIST FedRAMP and...

Updates

Presidential Executive Order "Improving Critical Infrastructure Cybersecurity"

February 13, 2013
https://csrc.nist.gov/news/2013/president-eo-improving-critical-infrastructure-cy

Recognizing that the national and economic security of the United States depends on the reliable functioning of critical infrastructure, the President under the Executive Order

Updates

National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health Information Demonstration Project

January 15, 2013
https://csrc.nist.gov/news/2013/nccoe-secure-exchange-of-electronic-health-inf-(1)

The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for…

Publications Journal Article (Final)

Introducing the Federal Cybersecurity R&D Strategic Plan

December 14, 2012
https://csrc.nist.gov/pubs/journal/2012/12/introducing-the-federal-cybersecurity-rd-strategic/final

Journal: The Next Wave - The National Security Agency's Review of Emerging Technologies Abstract: In December 2011, the White House Office of Science and Technology Policy (OSTP) released the Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program —a framework for a set of coordinated Federal strategic priorities and objectives for cybersecurity rese...

Publications Journal Article (Final)

Securing America’s Digital Infrastructure Through Education

December 14, 2012
https://csrc.nist.gov/pubs/journal/2012/12/securing-americas-digital-infrastructure-through-e/final

Journal: The Next Wave - The National Security Agency's Review of Emerging Technologies Abstract: This article provides an overview of the establishment of the National Initiative for Cybersecurity Education (NICE), its government structure, and it goals. Parallels are drawn between the strategic R&D thrust, Developing Scientific Foundations, described in "Trustworthy Cyberspace: Strategic P...

Events

FCSM Forum - Dec 2012

December 6, 2012
https://csrc.nist.gov/events/2012/federal-computer-security-managers-forum-decembe

Presentations & Speakers at a Glance: Census Risk Management Program Implementation, Jaime Noble, Department of Justice; and Use of Cybersecurity Function Codes, Harold Welch, OPM. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND THEIR DESIGNATED SUPPORT CONTRACTORS. REGISTRANTS MUST USE A .GOV, .EDU, OR .MIL ADDRESS FOR SIGN-UP. SUPPORT CONTRACTORS MUST INDICATE THE AGENCY OR ORGANIZATION THEY SUPPORT. The Federal Computer Security Program Managers Forum (the "Forum") is an informal group sponsored by the National Institute of...

Updates

National Cybersecurity Center of Excellence (NCCoE)

October 19, 2012
https://csrc.nist.gov/news/2012/national-cybersecurity-center-of-excellence-(nccoe

The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) invites interested U.S. companies to submit letters of interest in…

Events

ISPAB: OCTOBER 2012 MEETING

October 10, 2012 - October 12, 2012
https://csrc.nist.gov/events/2012/ispab-october-2012-meeting

(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes SP 800-53 Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations Ron Ross, NIST Fellow, Computer Security Division, NIST Dom Cussatt, Senior Policy Advisor, U.S. Department of Defense Greg Hall, Identity Management Program Manager, ODNI/CIO Tim Ruland, Chief IT Security Officer, U.S. Census Bureau OIG Perspectives on Cloud Computing and FISMA (OIG Panel) Gale Stone, (Moderator), Deputy Assistant Inspector General for Audit, SSA Dr. Brett M. Baker, Assistant IG for...

Publications ITL Bulletin (Final)

Revised Guide Helps Organizations Handle Security Related Incidents

September 27, 2012
https://csrc.nist.gov/pubs/itlb/2012/09/revised-guide-helps-organizations-handle-security/final

Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 800-61 Revision 2, Computer Security Incident Handling Guide. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effe...

Publications IR 7874 (Final)

Guidelines for Access Control System Evaluation Metrics

September 14, 2012
https://csrc.nist.gov/pubs/ir/7874/final

Abstract: The purpose of this document is to provide Federal agencies with background information on access control (AC) properties, and to help access control experts improve their evaluation of the highest security AC systems. This document discusses the administration, enforcement, performance, and support...

Publications ITL Bulletin (Final)

Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)

August 13, 2012
https://csrc.nist.gov/pubs/itlb/2012/08/security-of-bluetooth-systems-and-devices-updated/final

Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette of Accenture, Karen Scarfone of Scarfone Cybersecuri...

Events

FCSM Forum - Aug 2012

August 9, 2012
https://csrc.nist.gov/events/2012/federal-computer-security-managers-forum-august

Presentations & Speakers at a Glance: Electricity Subsector Cybersecurity Risk Management Process, Marianne Swanson, NIST, Scott Saunders, Sacramento Municipal Utility District, Matthew Light, NERC; and PIV Implementation, Derek Wood, U.S. Treasury. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND THEIR DESIGNATED SUPPORT CONTRACTORS. REGISTRANTS MUST USE A .GOV, .EDU, OR .MIL ADDRESS FOR SIGN-UP. SUPPORT CONTRACTORS MUST INDICATE THE AGENCY OR ORGANIZATION THEY SUPPORT. The Federal Computer Security Program Managers Forum (the...

Publications SP 800-61 Rev. 2 (Final) (Withdrawn)

Computer Security Incident Handling Guide

August 6, 2012

https://csrc.nist.gov/pubs/sp/800/61/r2/final

Abstract: Computer security incident response has become an important component of information technology (IT) programs. Because performing incident response effectively is a complex undertaking, establishing a successful incident response capability requires substantial planning and resources. This publicati...

Publications Journal Article (Final)

What Continuous Monitoring Really Means

July 24, 2012
https://csrc.nist.gov/pubs/journal/2012/07/what-continuous-monitoring-really-means/final

Journal: FedTech Magazine Abstract: Recently, NIST completed a fundamental transformation of the traditional certification and accreditation process into a comprehensive, near real-time, security life cycle process as part of a Risk Management Framework (RMF). The RMF, described in NIST Special Publication 800-37, provides a dynamic,...

Publications IR 7864 (Final)

The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities

July 10, 2012
https://csrc.nist.gov/pubs/ir/7864/final

Abstract: The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in which the feature also provides an avenue to comp...

<< first   < previous   33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57  next >  last >>