News in ITL - Computer Security

02/26/13
  • NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure

  • 02/06/13
  • NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document

  • 12/12/12
  • New NIST Document Offers Guidance in Cryptographic Key Generation

  • 11/27/12
  • NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain

  • 10/31/12
  • NIST Provides Draft Guidelines to Secure Mobile Devices

  • 10/16/12
  • New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard

  • 10/05/12
  • NIST Revises Software Patch Management Guide for Automated Processes

  • 10/02/12
  • NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition

  • Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track

  • 09/18/12
  • New NIST Publication Provides Guidance for Computer Security Risk Assessments

  • 08/21/12
  • NIST Co-Sponsors the 2012 Biometrics Consortium Conference

  • Security First: New NIST Guidelines on Securing BIOS for Servers

  • 08/08/12
  • Updated NIST Guide is a How-To for Dealing With Computer Security Incidents

  • 07/25/12
  • NIST Updates Guidance on Network Attacks and Malware

  • Software Features and Inherent Risks: NIST's Guide to Rating Software Vulnerabilities from Misuse

  • 07/11/12
  • NIST Releases Second Draft of Federal ID Credential Security Standard for Comment

  • NIST Releases Test Framework for Upgrading Smart Electrical Meters

  • NIST Updates Guidelines for Mobile Device Security

  • 06/12/12
  • NIST Releases Final Version of Revised Bluetooth Security Guide

  • 05/09/12
  • Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop

  • 05/04/12
  • Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain

  • 04/17/12
  • NIST Proposes Update to Digital Signature Standard

  • 04/03/12
  • April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls

  • 03/06/12
  • Guidance on Wireless Local Area Network Security is Close at Hand

  • 02/28/12
  • Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls

  • 02/21/12
  • NIST Establishes National Cybersecurity Center of Excellence

  • NIST Requests Comments on Updated Guide to Handling Computer Security Incidents

  • 02/07/12
  • Federal Information Systems Security Educators' Association Conference Meets March 27-29

  • 01/24/12
  • NIST Issues Cloud Computing Guidelines for Managing Security and Privacy

  • NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organization's IT System Security

  • 12/13/11
  • NIST Special Publication Expands Government Authentication Options

  • 11/22/11
  • New HIPAA Tool Helps Organizations Meet Security Requirements

  • 11/01/11
  • NIST Releases Draft Cloud Computing Technology Roadmap for Comments

  • 10/25/11
  • Final Version of NIST Cloud Computing Definition Published

  • NIST Releases Two Wireless Security Guides, Requests Comment

  • 10/13/11
  • NIST Publishes Guide for Monitoring Security in Information Systems

  • 10/04/11
  • Public/Private Leaders Collaborate on Ways to Fight Botnets

  • 09/20/11
  • Comprehensive Risk Assessment Guidance for Federal Information Systems Published

  • 09/13/11
  • Four New Reports Update Security Content Automation Protocol

  • NIST to Host Workshop on Cryptography for New Technologies

  • Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2

  • Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture

  • 07/19/11
  • New Version of Security Automation Protocol Includes Digital Trust Model

  • NIST Proposes New Privacy Controls for Federal Information Systems and Organizations

  • 06/21/11
  • Calling for Comments on Cybersecurity, Innovations and the Internet Economy

  • 06/08/11
  • Commerce Department Proposes New Policy Framework to Strengthen Cybersecurity Protections for Businesses Online

  • 05/12/11
  • NIST Seeks Comments on Draft Guide to Cloud Computing

  • 04/28/11
  • Build Safety into the Very Beginning of the Computer System

  • 03/30/11
  • NIST's Ron Ross is Named to InformationWeek Government Top 50 List

  • 03/15/11
  • Conference on Safeguarding Health Information Security, May 10-11

  • Dodson Receives ‘Federal 100’ Award for Cybersecurity Work

  • NIST Holds Third Cloud Computing Forum and Workshop, April 7-8

  • Two New SCAP Documents Help Improve Automating Computer Security Management

  • 03/01/11
  • New Publication Fundamentally Changes Federal Information Security Risk Management

  • NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations

  • 02/15/11
  • Emerging Trends in Cybersecurity is Topic of March IT Security Trainers' Conference

  • The NIST Role in Role-Based Control: A 20th Anniversary Appraisal

  • 02/01/11
  • Cloud Computing at NIST: Two New Draft Documents and a Wiki

  • NIST Issues Final Version of Full Virtualization Security Guidelines

  • 01/07/11
  • Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity

  • 01/05/11
  • And Then There Were Five: Finalists Advance in NIST's SHA-3 Cryptography Competition

  • IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol

  • Two Publications Recommend Organization-Wide IT Security Risk Management

  • 12/08/10
  • Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS

  • 11/09/10
  • New NIST Publication Provides Security Guidance for WiMAX Technologies

  • Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy

  • 08/31/10
  • Annual IT Security Automation Conference Runs Sept. 27-29

  • 08/03/10
  • Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation

  • New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning

  • 07/27/10
  • Cybersecurity, Innovation and the Internet Economy

  • 07/21/10
  • New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology

  • 07/06/10
  • NIST Software Security Patent to Help Improve Health IT Privacy

  • Updated Computer Security Publication Focuses on Security Assessment Plans

  • 06/23/10
  • July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation

  • National Initiative For Cybersecurity Education (NICE)ly Comes to You

  • 06/09/10
  • NIST Helps Accelerate the Federal Government's Move to the Cloud

  • 05/11/10
  • Comments Sought on Updated Guide for Assessing Federal IT Security Controls

  • 04/13/10
  • FISMA Project Manager Ron Ross Named to 2010 Federal 100 List

  • 03/30/10
  • Health Information Security Conference to Run May 11-12 in D.C.

  • 03/02/10
  • Comments Requested on Draft Guidelines for the Secure Deployment of IPv6

  • NIST Releases Guide for Applying the Risk Management Framework to Federal Information Systems

  • Role-Based Training for IT Security Is the Topic of March Educators’ Conference

  • 12/15/09
  • NIST Seeks Comments on Cryptography Standards Publication

  • NIST Updates Automated Computer Security Validation Guidelines

  • 12/01/09
  • NIST Develops Experimental Validation Tool for Cell Phone Forensics

  • 11/17/09
  • Certification and Accreditation Process for Federal Information Systems Transformed

  • Computer Researcher Named Distinguished Fellow of Information Security Group

  • 11/03/09
  • NIST Test Proves ‘The Eyes Have It’ for ID Verification

  • 10/06/09
  • New Computer Security Guide Can Help Safeguard Your Small Business

  • New Publication Offers Security Tips for WiMAX Networks

  • 09/22/09
  • October IT Security Automation Conference to Highlight Healthcare IT, Cloud Computing

  • 09/08/09
  • New NIST Publications Describe Standards for Identity Credentials and Authentication Systems

  • 08/11/09
  • NIST Releases Final Version of New Cybersecurity Recommendations for Government

  • 06/30/09
  • Workshop to Aim for Security, Accessibility in Future Voting Systems

  • 06/16/09
  • NIST Issues Latest Guidelines for Teleworking Security

  • NIST, DOD, Intelligence Agencies Join Forces to Secure U.S. Cyber Infrastructure

  • 06/02/09
  • NIST Delivers Updated Draft Standards for Electronic Voting Machines

  • 05/05/09
  • NIST Issues Draft Guide for Automating Computer Security Verification

  • 04/21/09
  • FISMA Project Manager Named to ISSA Hall of Fame

  • New NIST Guidelines for Organization-Wide Password Management

  • Two NIST Computer Security Professionals Named to 2009 Federal 100 List

  • 03/10/09
  • Safer Net Surfing Is Goal of NIST Domain Name Security Experts

  • 02/24/09
  • Updated Recommendations for Protecting Wireless, Remote Access Data

  • 02/10/09
  • First Major Update to SP 800-53 Is Available for Public Comment

  • 01/13/09
  • Sorting Diamonds from Toothbrushes: New Guide to Protecting Personal Information

  • 12/23/08
  • NIST Posts 51 Entries for New Hash Algorithm Competition

  • 12/09/08
  • Belgium to Host First Conference for New Hash Algorithm Competition

  • 11/12/08
  • NIST Receives 64 Submissions for New ‘Hash’ Algorithm

  • 10/14/08
  • Updated Specification Issued for PIV Card Implementations

  • 09/16/08
  • Upgraded Vulnerability Database Enables Advances in Security Automation

  • 09/03/08
  • Biometric Consortium Conference 2008 Will Be Held Sept. 23-25

  • NIST To Host 4th Security Automation Conference and Workshop

  • 08/19/08
  • NIST Requests Comments on Next Generation C/A Process for Information Systems

  • 08/06/08
  • Updated Information Security Performance Measurement Guide Published

  • Vegas ‘Quantum Spookshow’ Demos On-the-Fly Encryption of Streaming Video

  • 07/22/08
  • How Secure Is Your Network? NIST Model Knows

  • 07/09/08
  • New NIST Pub Can Help IT Managers Assess Security Controls

  • Software Helps Developers Get Started with PIV Cards

  • Wake-Up Call: Draft Security Pub Looks at Cell Phones, PDAs

  • 04/15/08
  • Comments Requested on Risk Management Publication

  • 04/01/08
  • New NIST Publication Recommends Best Fits Between Federal ‘Locks’ and ‘Keys’

  • NIST Shows On-card Fingerprint Match Is Secure, Speedy

  • 02/05/08
  • New Web Site Lists Validated Software Security Tools for Federal IT

  • 11/08/07
  • New Scoring System Protects Credit Card Transactions

  • NIST Issues Call for a New 'Hash' Algorithm

  • 10/25/07
  • Framework Document on Cybersecurity Open for Public Comment

  • 10/11/07
  • How to Protect Your Web Server from Attacks

  • 09/13/07
  • "Guide to Secure Web Services" Provides Blueprint to Safer Web 2.0

  • 08/30/07
  • Upgraded Software Makes ID Verification Testing Easier

  • 08/03/07
  • Comments Sought on New Security Publications

  • New Tools to Help Configure Secure Operating Systems

  • 07/20/07
  • Tailoring Computer Security for Industrial Controls

  • 12/21/06
  • December 21, 2006

  • 11/09/06
  • NIST Issues Info Security Primer for Managers

  • Steven Bellovin to Receive NIST/NSA Security Award

  • 10/26/06
  • Vulnerability Database Hits 20,000 Software-Flaw Mark

  • 10/12/06
  • NIST Issues Four-Pack of Computer Security Pubs

  • 09/28/06
  • Comments Sought on New IT Security Guides

  • 09/14/06
  • NIST Guide Details Forensic Practices for Data Analysis

  • 08/31/06
  • How-To Guide for Removing Data from Storage Media

  • 08/17/06
  • Draft Guidance on Improving Security of Home Computers

  • 08/03/06
  • NIST Makes Changes to Key Security Publication

  • 02/02/06
  • NIST Issues Final Federal Biometric Specs

  • 01/17/06
  • Updated Federal Guide on Cryptography Available

  • 11/17/05
  • Virgil Gligor to Receive NIST/NSA Security Award

  • 10/07/05
  • Federal Cryptography Guide Available for Comment

  • 09/09/05
  • Comments Sought on Revision of Federal ID Standard

  • 08/26/05
  • Conference to Highlight New Biometric Technologies

  • Improving Security of Handheld IT Devices

  • IT Program Hopes to Foster Better Security Checklists

  • 08/10/05
  • Comprehensive Database of Computer Vulnerabilities Now Available

  • Guidelines Issued for Certifying, Accrediting PIV Card Issuers

  • 07/26/05
  • Comments Sought on Draft Federal IT Security StandardComments Sought on Draft Federal IT Security Standard

  • Draft Guidelines Released for IT Security Controls

  • 06/30/05
  • Submissions Requested for Crypto Hash Workshop
  • Contact

    General Information:
    301-975-2900 Telephone
    301-975-2378 Facsimile

    100 Bureau Drive, M/S 8900
    Gaithersburg, MD 20899-8900