nist

Don't bother with blockchain: databases or email may be better

Don't bother with blockchain: databases or email may be better

National Institute of Standards report says it isn't magic and isn't immutable either.
Oct 11 2018 12:51PM
NIST tests biometrics algorithms for tattoo-matching database

NIST tests biometrics algorithms for tattoo-matching database

Working with the FBI to automate identification.
May 30 2016 6:11AM
Revealed: Australia's new cyber security strategy

Revealed: Australia's new cyber security strategy

How the government plans to make the country a "cyber smart nation".
Apr 11 2016 6:50AM
NIST formally chops NSA-tainted random number generator

NIST formally chops NSA-tainted random number generator

Dual_EC_DRBG algorithm no longer part of standard.
Jun 29 2015 6:47AM
The good thing about getting hacked

The good thing about getting hacked

How PTV regrouped and built up its security.
May 29 2015 1:00PM
Spooks are not compatible with IT security

Spooks are not compatible with IT security

[Blog post] Trust is gone.
May 20 2014 10:07AM
NIST launches post-NSA review into crypto guidance

NIST launches post-NSA review into crypto guidance

Updated: Addressing concerns over compromised algorithms.
May 15 2014 11:12AM
NIST reviews crypto development after NSA algo backdoor

NIST reviews crypto development after NSA algo backdoor

Public comment to follow.
Nov 6 2013 8:10AM
US proposes corporate cybersecurity standards

US proposes corporate cybersecurity standards

What 3000 people think.
Oct 24 2013 7:33AM
How to make the Framework for Cybersecurity useful

How to make the Framework for Cybersecurity useful

Must be specific.
Oct 22 2013 10:13AM
US govt website closures deny critical information

US govt website closures deny critical information

Closed for business.
Oct 9 2013 6:11AM
US government vulnerability database compromised

US government vulnerability database compromised

May have been infected for months.
Mar 15 2013 7:33AM
NIST releases virtualisation security How-to

NIST releases virtualisation security How-to

Dummies guide to securely configuring and using virtualisation.
Feb 7 2011 11:47AM
CE and whitegoods vendors at war over smart grid standards

CE and whitegoods vendors at war over smart grid standards

Australia in the crossfire as standards bodies step in to secure smart grid.
Mar 25 2010 6:31AM
NIST researchers map network security risks

NIST researchers map network security risks

U.S. computer scientists are analysing and mapping computer network pathways according to the probability of a data breach.
Jul 24 2008 5:06PM
NIST guidelines not adequate, warns Gartner

NIST guidelines not adequate, warns Gartner

The National Institute for Standards and Technology (NIST) has issued new recommendations to address system vulnerabilities, but Gartner warned today that this guidance does "not adequately reflect new threats and the evolving IT environment."
Feb 28 2006 9:27AM
NIST updates cryptography guidelines for U.S. Federal Agencies

NIST updates cryptography guidelines for U.S. Federal Agencies

In a bid to help U.S. federal agencies protect sensitive, but unclassified information, the National Institute of Standards and Technology (NIST) has updated guidelines for selecting and implementing cryptographic methods.
Jan 30 2006 9:51AM
NIST unveils new vulnerability database

NIST unveils new vulnerability database

The National Institute of Standards and Technology (NIST) has launched a new vulnerability database that integrates all publicly available federal vulnerability resources and provides links to industry resources.
Aug 15 2005 5:55PM
NIST gets busy with security draft

NIST gets busy with security draft

U.S. Commerce Department’s National Institute of Standards and Technology (NIST) has finalized a draft version of federal government computer security.
Jul 19 2005 2:37PM
NIST releases HIPAA resource guide

NIST releases HIPAA resource guide

The National Institute of Standards and Technology (NIST) has released a guide that federal agencies can use to help them understand HIPAA's security requirements.
Mar 29 2005 6:42PM

Log In

Username / Email:
Password:
  |  Forgot your password?