NIST

Press Releases

This is a complicated hybrid network with multiple vulnerabilities, and you can’t just protect it with a simple firewall the way you would if all your assets were inside the Head Office. Zero trust architectures can help. Credit: N. Hanacek/NIST
Because of its effectiveness against both internal and external threats, ZTA adoption is increasing, with some organizations required to use it.
June 11, 2025
63d846273df94ff69addcfac8ab8b483
The recent release of FIPS-compliant versions facilitates the transition to quantum-safe infrastructure for both public and private sectors.
Aug. 14, 2024
quantumcomputer2
NIST's newly published standards are designed to safeguard data exchanged across public networks, as well as for digital signatures for identity authentication.
Aug. 13, 2024
62c5a447e366ee62db5a5321_nist_approved_image
The NCCoE project brings together experts from industry, government, and academia to address the real-world needs of securing complex IT systems and protecting the nation’s critical...
July 2, 2024
Protection Professionals have recognized the void of industry consistency and the dire need for Standards specific to Executive Protection
Oct. 5, 2021
The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) released today the draft Baldrige Cybersecurity Excellence Builder, a self-assessment tool to help organizations better understand the effectiveness of their cybersecurity risk management efforts.
NIST is requesting public comments on the draft document
Sept. 16, 2016
Proposed revisions provide clarification on how to implement digital signature algorithms approved in standard
April 19, 2012
Conference provides attendees with an opportunity to discuss practical strategies for implementing the HIPPA security rule
April 19, 2012
Conference focuses on biometrics for security, identity management, borders and e-commerce
Sept. 3, 2008
Conference and workshops focus on open standards for automated computer security tasks
Sept. 3, 2008

Articles

The NIST Security and Privacy Controls for Information Systems and Organizations encompass a comprehensive assessment methodology that can be applied to specific types of organizations, manufacturers, industrial control systems, defense and US Federal contractor protection of confidential and unclassified information, etc.
UL and NIST provide options for system manufacturers and Integrators, so which should you choose?
Sept. 20, 2018
Ed Meltzer, president, Security, Cloud & Mobile Partners LLC, Kansas City, Mo.
This handy Q&A will help you determine if you and your customers are ready for cloud services
June 19, 2012

Request More Information From NIST

By clicking above, I agree to Endeavor Business Media's Terms of Service and consent to receive promotional communications from Endeavor, its affiliates, and partners per its Privacy Notice. I also understand my personal information will be shared with the sponsor of this content, who may contact me about their offerings per their privacy policy. I can unsubscribe anytime.

Additional content from NIST

Publication assists IT managers in supporting FISMA risk management framework
July 10, 2008
NIST engineers release 2-disk DVD on PPV for high-rise safety
June 24, 2008
Using fiber optics, NIST is able to generate raw code for 'unbreakable' encryption in record time
April 18, 2006
William Alan Jeffrey has been named as the new director for the National Institute of Standards.
Veteran of federal science and technology department succeeds Arden Bement
July 25, 2005
Security risks of VoIP, implementation of proper equipment, firewalls and encryption need to be considered
Jan. 26, 2005