On May 10, 2023, the National Institute of Standards and Technology (“NIST”) released an Initial Public Draft of Revision 3 to NIST Special Publication (“SP”) 800-171, Protecting Controlled ...
November 2025 has been a busy month for cybersecurity rules affecting government contractors. The long-awaited Cybersecurity Maturity ...
The National Institute of Standards and Technology issued Friday updated one of its major IT security guidance publications, characterizing it as "historic in nature." Special Publication 800-53 ...
Don't feel sorry that Ron Ross spent part of Veterans Day working on new guidance from NIST. The retired U.S. Army lieutenant colonel is passionate about his work. See Also: Post-Quantum Cryptography ...
Get the latest federal technology news delivered to your inbox. The National Institute of Standards and Technology is revising segments of its security controls, part of a larger patch release aimed ...
SANTA CLARA, Calif.--(BUSINESS WIRE)--AttackIQ Ⓡ, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced that its Security Optimization Platform can test the ...
NIST released a new guide proposing new privacy controls for federal information systems and organizations. The new document, Privacy Control Catalog, will become an ...
This report first appeared on CyberScoop. NIST Special Publication 800-53 isn’t the most exciting book, but for federal IT managers, the canonical catalogue of cybersecurity controls is like the ...
Last week, the National Institute of Standards and Technology (NIST) released the final version of recommended security controls for federal information systems. The new guideline will be the basis ...
Analysis showed most DoD, intelligence and civilian agencies' security controls were similar, making it possible to build a common governmentwide approach. The National Institute of Standards and ...
The class designations management, operational and technical have been reinstated to more closely conform to the existing organization of agencies' security programs. Guidance has been enhanced for ...
The changes, which are open to public comment, focus on user identity management and protecting cryptographic keys, among other security protocols. The National Institute of Standards and Technology ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results