Blog Posts Tagged with "NIST"

A7290c5bd7bc2aaa7ea2b6c957ef639b

NIST Releases Final Definition of Cloud Computing

November 03, 2011 Added by:David Navetta

NIST intends the definition "to serve as a means for broad comparisons of cloud services and deployment strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud computing..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Cooperative on 21st Century Smart Systems

October 20, 2011 Added by:Headlines

“There is a clear need for unifying principles within and across application domains. Investigating how cyber components can be synergistically interweaved with the diverse physical components in CPS pose foundational research challenges in science, engineering and computing..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Federal Cloud Technology Roadmap to be Introduced

October 18, 2011 Added by:Headlines

NIST’s role is to help accelerate the secure and effective adoption of cloud computing. The agency leads efforts to develop standards and guidelines and advance cloud computing technology in collaboration with standards bodies, businesses, and government agencies...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Guide for Monitoring Information Systems Security

October 17, 2011 Added by:Headlines

Information Security Continuous Monitoring for Information Systems and Organizations provides guidance for information security monitoring in all types of systems – a term that encompasses not only computer networks but also a host of other interconnected devices and software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Public/Private Collaboration to Fight Botnet Plague

October 11, 2011 Added by:Headlines

Botnets have increasingly put computer owners at risk. Researchers estimate that about 4 million new botnet infections occur each month. When a computer is infected by a botnet, personal information and communications can be monitored and Internet access can be exploited...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cybersecurity Awareness Month: Why Browsers Matter

September 29, 2011 Added by:Headlines

“Modern browsers provide significant value... especially in the areas of security and privacy. They help protect users from phishing sites and malicious downloads while supporting industry standards... We recommend that users update their browser to the latest version available....”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Releases Cyber Security Evaluation Tool (CSET)

September 27, 2011 Added by:Headlines

The Department of Homeland Security's National Cyber Security Division (NCSD) has released a Software tool set to better enable organizations to examine risks to industrial control systems (ICS) and implement more secure protocols for protecting the nation's critical infrastructure...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Risk Assessment Guide for Federal Information Systems

September 22, 2011 Added by:Headlines

The revised guidance has been expanded to include more information on a variety of risk factors essential to determining information security risk, such as threat sources and events, vulnerabilities and predisposing conditions, impact, and likelihood of threat occurrence...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Definitions – Keeping it Simple with OSSM

September 21, 2011 Added by:Ben Kepes

Spending so much time in the rarefied atmosphere of the twitterverse, it’s easy to assume that everyone “gets it”. The truth is somewhat different – the vast majority of people out there are still coming to terms. For them the Cloud is an unheard of concept and unexplained territory...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Guidelines: Security Content Automation Protocols

September 20, 2011 Added by:Headlines

Bringing order and security to the patchwork quilt of computing environments in a large organization can be a daunting task. NIST recently released four new publications that detail specifications to be used by the latest version of the Security Content Automation Protocol (SCAP)...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Releases Secure Cloud Computing Guidelines

September 15, 2011 Added by:Headlines

NIST is responsible for accelerating the federal government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines in close consultation and collaboration with standards bodies, the private sector and other stakeholders, including federal agencies...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. - E.U. Collaborate on Smart Grid Standards

September 14, 2011 Added by:Headlines

"The potential benefits of Smart Grids are enormous, they can only be fully reached if we can all agree on global solutions. It is promising to see that NIST and SG-CG will be supporting common positions and areas of collaboration to ensure a consistent set of international standards..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cryptography for Emerging Technologies and Applications

August 23, 2011 Added by:Headlines

The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Getting Started with the New Red Hat 5 STIG

August 18, 2011 Added by:Jamie Adams

The generic UNIX STIG supported numerous UNIX and Linux distributions but never addressed Red Hat Enterprise Linux 5. For many years, this lack of support was a source of frustration for system administrators. I've completed my initial review and I want to share some of my findings and tips...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

NIST Seeks Comments on National Initiative for Cybersecurity

August 16, 2011 Added by:Headlines

The plan, "Building a Digital Nation," outlines NICE's mission, vision, goals and objectives. NIST and its interagency NICE partners seek comments from all interested citizens and organizations concerned with cybersecurity awareness, training and education...

Comments  (1)

0f57a863af3b7e5bf59a94319a408ff7

Auditing: Remote Access Security in 2011

August 15, 2011 Added by:Enno Rey

When the standards were written, endpoints were supposed to be mostly company managed Windows systems. In the meantime most organizations face an unmanaged mess composed of a growing number of smartphones and tablets, some company managed, while some are predominantly free floating...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »