NIST - Information Technology

  1. In an effort to counter the often pernicious effect of biases in artificial intelligence (AI) that can damage people’s lives and public trust in AI, the National Institute of Standards and Technology (NIST) is advancing an approach for identifying and managing these biases — and is requesting the public’s help in improving it. NIST outlines the approach in A Proposal for Identifying and Managing Bias in Artificial Intelligence (NIST Special Publication 1270), a new publication that forms part of the agency’s broader effort to support the development of trustworthy and responsible AI. NIST is
  2. NIST's National Cybersecurity Center of Excellence (NCCoE) has finalized NISTIR 8320A, Hardware-Enabled Security: Container Platform Security Prototype. The foundation of any data center or edge computing security strategy should be securing the platform on which data and workloads will be executed and accessed. The physical platform represents the first layer for any layered security approach and provides the initial protections to help ensure that higher-layer security controls can be trusted. This report explains an approach based on hardware-enabled security techniques and technologies for
  3. The White House Office of Science and Technology Policy and the National Science Foundation announced the formation of the National Artificial Intelligence (AI) Research Resource Task Force June 10, 2021. The task force will advance the objectives stated in Congress’s National AI Initiative Act of 2020 by serving in an advisory capacity to develop an implementation roadmap for the National AI Research Resource, which aims to provide AI researchers and students across all scientific disciplines with access to computational resources, high-quality data, educational tools, and user support. NIST
  4. NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report (NISTIR) 8335, Identity as a Service for Public Safety Organizations. Identity as a service (IDaaS) is when a company offers identity, credential, and access management (ICAM) services to customers through a software-as-a-service (SaaS) cloud-service model. Public safety organizations (PSOs) could potentially reduce costs and adopt new standards and authenticators more easily by using IDaaS to provide authentication services for their own applications. This would
  5. NIST has developed the Open Security Controls Assessment Language, which is a multi-format framework that allows security professionals to automate security assessment, auditing, and continuous monitoring processes, making systems’ authorization-to-operate processes and the overall risk management easier. Today, security professionals are faced with several challenges that are resource intensive such as systems’ complexity, paper-based assessment processes that do not scale well or proprietary automation solutions that are not interoperable and overlapping standards and regulatory frameworks
  6. To help foster wider access to voting, the National Institute of Standards and Technology (NIST) is requesting information from the public about barriers that limit the ability of people with disabilities to vote privately and independently. The request for information (RFI), which appears today in the Federal Register, is part of NIST’s response to the March 7, 2021, Executive Order (EO) 14019 on Promoting Access to Voting. NIST will use the responses it receives to inform a report planned for December 2021 offering recommendations on how to overcome barriers that these voters experience. “A
  7. NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new Preliminary Draft report, NIST Interagency or Internal Report (NISTIR) 8374, Cybersecurity Framework Profile for Ransomware Risk Management. Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. In some instances, attackers may also steal an organization’s information and demand additional payment in return for not disclosing the information to authorities, competitors, or the public. Ransomware can disrupt or halt organizations’ operations. This
  8. NIST's National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report (NISTIR) 8336, Background on Identity Federation Technologies for the Public Safety Community. NIST Special Publication (SP) 800-63-3 defines identity federation as “a process that allows the conveyance of identity and authentication information across a set of networked systems.” Identity federation technologies can help public safety organizations (PSOs) to share information with each other more easily while also protecting that data from unauthorized access
  9. Not all security vulnerabilities can be found through automated processes or testing. Internal and external reporting of security vulnerabilities in software and information systems owned or utilized by the Federal Government is critical to mitigating risk, establishing a robust security posture, and maintaining transparency and trust with the public. In 2020 alone, more than 18,000 vulnerabilities were publicly listed in the National Vulnerability Database (NVD). NIST is inviting comments on Draft NIST Special Publication (SP) 800-216, Recommendations for Federal Vulnerability Disclosure
  10. The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Migration to Post-Quantum Cryptography. Publication of this project description begins a process to further identify project requirements, scope, and hardware and software components for use in a laboratory environment. The NCCoE will solicit participation from industry to develop and demonstrate practices to ease migration from the current set of public-key cryptographic algorithms to replacement algorithms that are resistant to quantum computer-based attacks. These practices will take the

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form