On May 10, 2023, the National Institute of Standards and Technology (“NIST”) released an Initial Public Draft of Revision 3 to NIST Special Publication (“SP”) 800-171, Protecting Controlled ...
Don't feel sorry that Ron Ross spent part of Veterans Day working on new guidance from NIST. The retired U.S. Army lieutenant colonel is passionate about his work. See Also: Thwarting Cyberthreats in ...
Get the latest federal technology news delivered to your inbox. The National Institute of Standards and Technology is revising segments of its security controls, part of a larger patch release aimed ...
In May, the National Institute of Standards and Technology (NIST) issued updated recommendations for security controls for controlled unclassified information (CUI) that is processed, stored or ...
The National Institute of Standards and Technology (NIST) has unveiled a comprehensive initiative to address the growing cybersecurity challenges associated with artificial intelligence systems ...
On Wednesday, July 28, 2021, the President signed a National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems. The National Security Memorandum establishes a ...
A chief privacy officer must ensure that whatever personal data an agency gathers is the right information for the job, that it is collected legally and that it is stored safely. Appendix J of the ...
What NIST-led innovation is estimated to have saved U.S. industry $6.1 billion over the past 20 years? Well, probably several, but, perhaps surprisingly, a new economics study* points to the ...
The National Institute of Standards and Technology is developing a Cybersecurity Practice Guide with steps for recovering equipment and restoring operations after cyberattacks on industrial control ...
The IT industry isn't just one job or one set of skills, but there are a few constants across tech careers that can be helpful to study. The NIST framework is a structured approach to integrating ...
The changes, which are open to public comment, focus on user identity management and protecting cryptographic keys, among other security protocols. The National Institute of Standards and Technology ...