You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to https://csrc.nist.rip.
An unofficial archive of your favorite United States government website
Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.
We are building a provable archive!
A lock () or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)
NIST is pleased to announce the publication of a report by the University of Maryland’s Supply Chain Management Center titled “The Cyber Risk Predictive Analytics Project”.
NIST announces the release of Draft Special Publication 800-171A, Assessing Security Requirements for Controlled Unclassified Information. This publication is.....
NIST announces the release of an errata update for Special Publication 800-171, Revision 1, Protecting Controlled Unclassified Information is Nonfederal Systems and Organizations. The errata.....
NIST announces the release of Special Publication (SP) 800-67, Revision 2, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. This publication specifies.....
NIST announces the public comment release of Draft Special Publication 800-52 Revision 2, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Transport Layer Security (TLS)...
The national need for a common lexicon to describe & organize the cybersecurity workforce and requisite knowledge, skills, and abilities (KSAs) led to the.....
Papers and presentations are solicited for the 5th Annual Hot Topics in the Science of Security (HoTSoS) Symposium, which will be held April 10–11, 2018 at the StateView Hotel in Raleigh, N.C., ......
NIST Announces the Release of a Discussion Draft of Special Publication (SP) 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
NIST Releases the Initial Public Draft of Special Publication 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations.
NIST Releases Draft Special Publication 800-56A Revision 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, for public comment.
NIST Announces the release of Draft Special Publication 800-56C Revision 1, Recommendation for Key Derivation through Extraction-then-Expansion for public comment.
NIST invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Secure Inter-Domain Routing Building Block. Participation in the building block is open to all...
Application Containers are slowly finding adoption in enterprise IT infrastructures. To address security concerns associated with deployment of application container platforms, NIST Special Publication 800-190 (2nd...
NIST requests public comments on the release of Draft Special Publication (SP) 800-70 Revision 4, National Checklist Program for IT Products: Guidelines for Checklist Users and Developers.
NIST is pleased to announce the final publication of NIST Interagency Report (NISTIR) 8011, Automation Support for Security Control Assessments, Volumes 1 and 2.
NIST announces the public comment release of Draft Special Publication 800-193, Platform Firmware Resiliency Guidelines. The platform is a collection of fundamental hardware and firmware components needed to boot and operate...
As the world rapidly embraces the Internet of Things, properly securing medical devices has grown challenging for most healthcare delivery organizations (HDOs).......
NISTIR 8170 rovides guidance on how the Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework) can be used in the U.S. Federal Government in conjunction with the current and planned suite of...
The Department of Homeland Security (DHS) has published the "Study on Mobile Device Security," a report to Congress that details current and emerging threats to the Federal Government's use of mobile devices. It also...
NIST's NCCoE invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Capabilities Assessment for Securing Manufacturing Industrial Control Systems....
On Thursday, February 23rd, Google announced that a team of researchers from the CWI Institute in Amsterdam and Google have successfully demonstrated an attack on the SHA-1 hash algorithm by creating two files that hash to...
NIST has launched a beta site for a new version of CSRC.nist.gov: https://beta.csrc.nist.rip. It will be available alongside http://csrc.nist.rip for several months as we continue to fix issues, implement enhanced...
NIST requests comments on a proposed update to the Framework for Critical Infrastructure Cybersecurity (the "Framework"). The proposed update to the Framework is available for review at...
* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.