NIST - Information Technology

  1. Information security continuous monitoring (ISCM) programs provide an understanding of risk tolerance and help officials set priorities and consistently manage information security risk throughout the organization. NISTIR 8212, An Information Security Continuous Monitoring Program Assessment, provides an operational approach to the assessment of an organization’s ISCM program using ISCMAx – a free, publicly available working implementation of the ISCM program assessment described in NIST SP 800-137A. NISTIR 8212 provides instructions for using ISCMAx and guidance for tailoring the ISCMAx tool
  2. In recent years criminals and other attackers have compromised the networks of several major hospitality companies, exposing the information of hundreds of millions of guests. A hotel property management system (PMS) is a prime target for attackers – it serves as the information technology operations and data management hub of a hotel and could give a criminal access to a trove of valuable data. The NIST National Cybersecurity Center of Excellence collaborated with the hospitality business community and cybersecurity technology providers to build an example solution demonstrating how
  3. When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part of urgent efforts to fight COVID-19, a science is rapidly developing for measuring the number of encounters and the different levels of interaction in a group. At the National Institute of Standards and Technology (NIST), researchers are applying that science to a concept they have created called “encounter metrics.” They have developed an encrypted method that can be applied to a device such as your phone to help with the ultimate goal
  4. To help secure our elections, NIST has released Draft NISTIR 8310, Cybersecurity Framework Election Infrastructure Profile. This Profile provides a voluntary, risk-based approach for managing cybersecurity activities and reducing cyber risk to election infrastructure. The Profile is meant to supplement but not replace current cybersecurity standards and industry guidelines available to election officials. This profile can be used in several ways, including the following: To highlight and communicate high priority security expectations, To perform a self-assessment comparison of current risk
  5. A new practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive target for hackers: the hotel property management system (PMS), which stores guests’ personal information and credit card data. The three-part guide, formally titled Securing Property Management Systems (NIST Special Publication [SP] 1800-27 a, b and c), shows an approach to securing a PMS. It offers how-to guidance using commercially available products, allowing hotel owners to control and limit access to their PMS and
  6. Making elections secure means protecting against ever-evolving threats to information technology — which scans in-person and mail-in ballots, supports voter registration databases and communicates vote tallies. To reduce the risk of cyberattacks on election systems, the National Institute of Standards and Technology (NIST) has released draft guidelines that provide a road map to help local election officials prepare for and respond to cyber threats that could affect elections. Comments on the draft will be accepted through May 14, 2021. Written in everyday language, the Draft Cybersecurity
  7. Fingerprints are a great means for proving you are (or are not) who you say you are, and we’ve spent the past 2,200 years making progressively greater use of them. Nowadays, we can use digital technology to collect fingerprints for tasks like getting into your phone or home, or as evidence during crime investigations. But for all the technology advances through the years, collecting fingerprints still requires touching something. Digital technology can collect fingerprints with distinct features as small as 0.002 inches (0.051mm) using touch-based collection devices, but they can be cumbersome
  8. Twenty-three middle-school girls from the St. Vrain Valley School District in Longmont, Colorado, have logged on to their school tablets and laptops for a special kind of class on a frigid February afternoon: an introduction to coding — a new experience for some of them — and to learn what a career in science, technology, engineering and mathematics (STEM) looks like for women. And today they have help from scientists at the National Institute of Science and Technology (NIST) in Boulder, Colorado, including Boulder Laboratory Director Marla Dowell, who oversees communications technology
  9. Researchers at the National Institute of Standards and Technology (NIST) have developed a new, interactive spreadsheet that will help the U.S. military extinguish aircraft and vehicle fires using the latest environmentally friendly chemicals. While it may sound old-school, the spreadsheet is actually an upgrade of a NIST computer program that has helped protect valuable military assets and lives for several decades, despite being based on the vintage operating system MS-DOS. Fire protection is a major issue for military vehicles, which carry flammable fluids and can incur significant damage
  10. A new publication from the National Institute of Standards and Technology (NIST) provides companies, government agencies, and other organizations with a set of practices that any organization can use to manage growing cybersecurity risks associated with their supply chains. NIST researched and compiled these practices knowing that organizations can no longer protect themselves by simply securing their own infrastructures; their “electronic perimeters” now are not meaningful and threat actors can and do intentionally target the suppliers of more cyber-mature organizations by taking advantage of

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form