An advisory group set up the National Institute for Standards and Technology to examine revelations about the National Security Agency's involvement in the NIST encryption process is warning that NIST must be able to reject NSA "advice" about cryptography "when warranted."
Joseph M. Barton outlines why the NIST Framework is an excellent foundation upon which any organization can build its information security program.
The National Institute of Standards and Technology released this week a free mobile app management vetting tool called AppVet.
In the aftermath of media reports that the National Security Agency cracked much of the online encryption used to protect data, the National Institute for Standards and Technology, or NIST, is undertaking a review of its process for developing encryption standards.
After a year of work that included a series of workshops with private sector representatives, the National Institute of Standards and Technology released on Wednesday the final version of its cybersecurity framework for critical infrastructure.
Without hardware security for mobile devices, apps for mobile commerce, mobile money and mobile wallets will have "difficulty getting off the ground and finding adoption by credit card providers," judges ABI Research.
Increasing cyber threats are fueling growth in the smart grid cybersecurity market, which is forecast by TechNavio to increase at a 29.4 percent compound annual growth rate through 2016.
I encourage the private sector to attend the NIST workshop next week and participate fully in the process of developing its cybersecurity framework for critical infrastructure. It will serve not only as a security guideline for critical infrastructure firms, but also as a model for all industries.
The National Institute of Standards and Technology, tasked by President Obama to develop a cybersecurity framework for privately-owned critical infrastructure, released a draft of the framework this week.
Revelations that the National Security Agency intentionally weakened encryption in order to gain access to encrypted data have undermined confidence in international encryption standards.