- by Nicole KellerPhishing is one of the most common types of cyber crime. These scams use convincing emails or other messages, such as text messages or social media messages, to trick users into opening harmful links, downloading malicious software, or submitting
- by Crissy RobinsonThe Iris Experts Group is a forum for the discussion of technical questions of interest to USG agencies and their staff that are employing or may employ iris recognition to carry out their mission. This is the annual meeting. The presentations
- by Nicole KellerOne of the major updates to CSF 2.0 is the creation of the Govern Function, highlighting the importance of ensuring cybersecurity capabilities support the broader mission through Enterprise Risk Management (ERM). Governance is the process of
- by Crissy RobinsonHigh-performance computing (HPC) systems provide fundamental computing infrastructure and play a pivotal role in economic competitiveness and scientific discovery. Security is an essential component of HPC. NIST HPC Security Working Group (WG) has
- by Pauline TruongThe Open Industrial Digital Ecosystem Summit is an annual event bringing together thought leaders, experts, practitioners, developers, and users of standards for data semantics. The event is co-hosted by the Systems Integration Division of the
- by Jennifer GerlockThe National Institute of Standards and Technology will host a developer conference on Tuesday, March 25, and Wednesday, March 26, 2025. The event will focus on the macOS Security Compliance Project (mSCP) and is tailored for vendors developing
- by Nicole KellerRegistration has reached capacity for this event. A recording will be posted to this page after the event. To address the ever-evolving cybersecurity landscape and equip organizations with information and resources to more quickly and effectively
- by Sarah HendersonThe new algorithm will serve as a backup for the general encryption needed to protect data from quantum computers developed in the future.
- by Sarah HendersonUsing differential privacy can help organizations glean useful insights from databases while protecting individuals’ data.
- by Crissy RobinsonNIST will host a full-day hybrid workshop at the NCCoE to continue discussions related to a major update of NIST IR 8259. The day's activities will feature an overview of NIST's current status in updating NIST IR 8259 with extensive Q-and-A and
- by Susana BarrazaThe presentation slides are available here. Download the Continuing Education Units form . Provide event feedback here. Speakers: Lisa Plaggemier Executive Director National Cyber Security Alliance Joe Jones Research & Insights Director International
- by Aliza ReisbergIn recent years, numerous Internet routing incidents — such as Border Gateway Protocol (BGP) prefix hijacking, and route leaks — have caused data to be delivered to unintended destinations, to divert paths across the Internet to pass through
- by Jennifer GerlockNIST invites the cybersecurity and IoT communities to join a discussion on updating Foundational Cybersecurity Activities for IoT Device Manufacturers (NIST IR 8259) IoT Device Cybersecurity Capability Core Baseline (NIST IR 8259A) IoT Non-Technical
- by Susana BarrazaThe presentation slides are available here. Download the Continuing Education Units form . Provide event feedback here. Speakers: Rachel Zimmerman Senior Director CyberPatriot Business Operations Air & Space Forces Association Loyce Pailen Senior
- by Doug MontgomeryCTL staff Scott Rose, Oliver Borchert, and Doug Montgomery participated in the first joint O-RAN / 3GPP workshop on the standardization of zero trust architecture (ZTA) in mobile networks. Scott opened the workshop with a presentation on "NIST
- by Aliza ReisbergNIST’s Cherilyn Pascoe and the Post Quantum Cryptography Standards project team have been selected as winners of the 2024 CyberScoop 50 Awards . The winners were chosen in recognition of their important work in protecting vital networks, critical
- by Aliza ReisbergAfter over a year of evaluation, NIST has selected 14 candidates for the second round of the Additional Digital Signatures for the NIST PQC Standardization Process.
- by Jennifer GerlockThe Department of Health and Human Services (HHS) Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) are pleased to announce the return of the Safeguarding Health
- by Aliza ReisbergOn October 15, 2024, NIST’s National Cybersecurity Center of Excellence (NCCoE) was presented with an official proclamation by Montgomery County Executive Mr. Marc Elrich at the Cybersecurity Connections Event in Rockville, Maryland. This recognition
- by Rachel KotaryOn Thursday Sept 26, 2024, NIST held its first Automated Vehicle (AV) Research Day as an internal celebration of NIST research in automated driving. The morning session included an opening address by Charles Romine, NIST Associate Director for