Blog Posts Tagged with "NIST"

69dafe8b58066478aea48f3d0f384820

NIST Workshop to Support Trusted IDs in Cyberspace

January 27, 2012 Added by:Headlines

The workshop will focus on how technologies and standards can help the framework of the Identity Ecosystem coalesce. As envisioned by the NSTIC, the Identity Ecosystem is a user-centric online environment—a set of technologies, policies and agreed upon standards...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Draft Guidance for Monitoring IT System Security

January 26, 2012 Added by:Headlines

Three new draft reports published by the NIST are designed to help both public and private organizations improve the security of their information management systems by developing capabilities for continuous monitoring of security...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Encryption Basics: It's Not a Mystical Science

January 25, 2012 Added by:PCI Guru

Regardless of the algorithm used, they are not perfect. Over time, encryption algorithms are likely to be shown to have flaws or be breakable. Some flaws may be annoyances that you can work around or you may have to accept some minimal risk of their continued use...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Guidelines: Protecting Computers at Start-Up

December 29, 2011 Added by:Headlines

SP 800-155 explains the fundamentals of BIOS integrity measurement to determine if the BIOS has been modified and how to report changes. The publication provides detailed guidelines to vendors that develop products to support secure BIOS integrity measurement mechanisms...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HIPAA Security Rule Toolkit Available from NIST

December 21, 2011 Added by:Headlines

"The NIST HIPAA Security Toolkit Application is intended to help organizations better understand the requirements of the HIPAA Security Rule, implement those requirements, and assess those implementations in their operational environment..."

Comments  (1)

Fe3139b2aae983885565da7757da08a8

Chatting With An Auditor About Credit Union Compliance

December 16, 2011 Added by:Ed Moyle

Credit unions, by virtue of their regulatory context, have more "interpretive latitude" in how technical security controls get implemented. Meaning they should try on PCI compliance before calling out merchants - especially the big ones - for having it soft...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Revision Expands Government Authentication Options

December 16, 2011 Added by:Headlines

“Changes made to the document reflect changes in the state of the art. There are new techniques and tools available to government agencies, and this provides them more flexibility in choosing the best authentication methods for their individual needs, without sacrificing security..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NICE Seeks Feedback on Cybersecurity Workforce Framework

December 05, 2011 Added by:Headlines

"Establishing and using a unified framework for cybersecurity work and workers is not merely practical but vital to the nation's cybersecurity. Much as other professions have defined their specialties, it is now time to forge a common set of definitions for the cybersecurity workforce..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

HIPAA Tool Helps Organizations Meet Security Requirements

November 30, 2011 Added by:Headlines

A new tool, developed by the NIST is intended to be a resource that organizations can use to support their risk assessment processes by identifying areas where security safeguards may be needed to protect EPHI, or where existing security safeguards may need to be improved...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Improves Tool for Hardening Software Security

November 29, 2011 Added by:Headlines

"The SRD is for companies that build static analyzers... It will help their products catch the most common errors in the software they are supposed to check. It brings rigor into software assurance, so that the public can be more confident that there are fewer dangerous weaknesses..."

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

GovCloud.com: New Hub for Government Cloud Computing

November 28, 2011 Added by:Kevin L. Jackson

GovCoud is the “go to” place for everything related to federal cloud computing. Our mission is to help federal organizations learn about, try and securely adopt cloud computing technologies. This site will provide a community hub for information dissemination and GovCloud best practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Utility Cyber Security is in a State of Near Chaos

November 16, 2011 Added by:Headlines

"Utility cyber security is in a state of near chaos. After years of vendors selling point solutions, utilities investing in compliance minimums rather than full security, and attackers having nearly free rein, the attackers clearly have the upper hand..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Public-Private Partnership to Promote Cybersecurity Education

November 10, 2011 Added by:Headlines

NIST, the Department of Education and NCEC will work with state and local counterparts to enhance cybersecurity education programs for kindergarten through 12th grade, higher education and vocational programs to provide skilled cybersecurity workers for both the private sector and government...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NICE Issues Cybersecurity Workforce Framework

November 09, 2011 Added by:Headlines

The framework organizes cybersecurity work into high-level categories ranging from the design, operation and maintenance of cybersecurity systems to incident response, information gathering and analysis. The document is meant to define professional requirements in cybersecurity...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Updates Smart Grid Framework Standards

November 08, 2011 Added by:Headlines

"Making such dramatic changes to the power grid requires an overarching vision of how to accomplish the task, and this updated Framework advances that vision. Utilities, manufacturers, equipment testers and regulators will find essential information... that was not previously available..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Seeks Feedback on Wireless Security Guides

November 07, 2011 Added by:Headlines

The NIST has issued two new guides addressing issues with wireless security. The first guide focuses on Bluetooth security, while the second looks at wireless local area networks. The NIST is seeking public comment on the guides via email with a November 10th cutoff for submissions...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »