Why least privilege management is essential to the new NIST risk assessment guidelines

Paul Kenyon Top Priority Sector:  it_security Image Caption:  Paul Kenyon Last month, the US National Institute of Standards and Technology (NIST) updated its Guide for Conducting Risk Assessments to make it easier for federal organizations to respond effectively to cyber-related risks.  Homepage position:  10 read more View full post on Government Security News View…

read more

NIST chooses winner in secure hash algorithm competition

Mark Rockwell Top Priority Sector:  cyber_security NIST said “catch-ack” in selecting a new algorithm that could be used as part of a secure foundation for future information technologies. The agency announced the winner of its five-year-long Secure Hash Algorithm (SHA-3) Competition on Oct. 2, choosing “Keccak”  –   which it said…

read more

NIST panel to weigh cyber topics in DC on Oct. 10-12

Jacob Goodwin Top Priority Sector:  cyber_security NIST’s information security and privacy advisory board will hold three days of public meetings at a hotel in Washington, DC, on Oct. 10-12 to hear from the White House director of cyber security, the director of the National Cybersecurity and Communications Integration Center, and…

read more

NIST awards Cyber ID tech grants to budding pilot programs

Mark Rockwell Top Priority Sector:  cyber_security Five companies working to develop trusted electronic identity technologies to combat identity theft, protect online transactions and secure information sharing were given $10 million in grants under NIST’s National Strategy for Trusted Identities in Cyberspace (NSTIC) program. Homepage position:  10 read more View full…

read more

NIST guide aims to set foundation for Cyber risk assessment for infrastructure, law enforcement

Mark Rockwell Top Priority Sector:  cyber_security Image Caption:  NIST The National Institute of Standards and Technology (NIST) released its final version of Cyber risk assessment guidelines aimed at critical infrastructure entities, law enforcement and the military with information they need to secure their organization’s information security and information technology infrastructures….

read more