NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Search NIST IT Security
Search For:   Enhanced Query Form
Search In:
 
Results 1 - 1 of 1 in Content
bullet NIST FIPS 140-2
...dules to Federal Information Processing Standard (FIPS) 140-2 and other cryptography based standards. Download the complete NIST FIPS 140-2. Plea...
Posted on Wednesday 15 November 2006 - 20:44:06 in Federal Information Processing Standards (FIPS)

bullet NIST FIPS 197 - Advanced Encryption Standard (AES)
NIST announced the approval of FIPS 197 Advance Encryption Standard (AES) November 2001. AES specifies the Rijndael encryption algorithm as a FIPS-ap...
Posted on Saturday 21 January 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet NIST SP 800-73 Interfaces for Personal Identity Verification
...ors, Federal Information Processing Standard 201 (FIPS 201) was developed to establish standards for identity credentials. This document, Special Publ...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet NIST FIPS 201 Personal Identity Verification (PIV)
...t information systems. Download the complete NIST FIPS 201 Please use the NIST.org Forum to ask questions or discuss this document. The belo...
Posted on Monday 06 February 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet Federal Information Processing Standards (FIPS)
With the passage of the Federal Information Security Management Act (FISMA) of 2002 all Federal Information Processing Standards (FIPS) are now manda...
Posted on Sunday 22 January 2006 - 16:44:21 in NIST.gov Publications

bullet Guide to NIST Computer Security Documents
In order to make NIST information security documents more accessible, especially to those just entering the security field or with limited needs for t...
Posted on Monday 30 April 2007 - 19:58:26 in NIST.gov Publications

bullet Announcing the Release of Special Publication 800-78-3
...key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances.
Posted on Saturday 03 December 2011 - 14:17:00 in NIST Computer Security Division News

bullet NIST SP 800-48 Revision 1, Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...port for Federal Information Processing Standard (FIPS) validated cryptographic algorithms. Therefore, NIST recommends that organizations with existin...
Posted on Tuesday 07 August 2007 - 22:00:00 in Draft Special Publications (SP) 800 Documents

bullet NIST SP 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
...es for PIV systems and is a companion document to FIPS 201. Download the entire NIST SP 800-78 PDF You may use the NIST.org Forum to ask question...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet Important HSPD-12 Documents and Links
... how to implement it *OMB Memorandum M-05-24 *FIPS 140-2 *FIPS 201 NIST Special Publictions *NIST SP 800-73 *NIST SP 800-76 *NIST...
Posted on Sunday 05 February 2006 - 22:00:00 in HSPD-12

Results in Links
No matches found
Results 1 - 10 of 20 in News
bullet GSA Awards Large Contracts for 10 Encryption Products
... “data at rest”. All 10 products use NIST.gov FIPS 140-2 validated encryption modules. You will be hearing much more about these products in the c...
Posted on Wednesday 20 June 2007 - 22:52:35

bullet Evidence that Encrypting Data is the Easy Part
...a, classified, data, top, secret, key, truecrypt, fips, 140-2, fbi, keylogger, chi, mak, tai, security, china, aes, aes256, aes128, blowfish, CAST5, s...
Posted on Friday 25 May 2007 - 15:27:08

bullet NIST.gov releases RFID Security Publication and a NIST Security Table of Contents
..., sp, special, publication, table, contents, 800, fips@@@ NIST.gov has released NIST Special Publication (SP) 800-98, Guidelines for Securing Ra...
Posted on Tuesday 01 May 2007 - 05:56:20

bullet U.S. Government Agencies Banning Microsoft Vista
...curity, moratorium, nist, gov, dot, faa, federal, fips, aviation, administration, office, 2007, google, apps, ocio@@@ In what turning out to be...
Posted on Tuesday 13 March 2007 - 21:56:36

bullet NSA Posts Notice on ‘Suite B’ encryption
...ough the Federal Information Processing Standard (FIPS) 201 for identity cards makes no specific reference to it, said Brendan Ziolo, marketing direct...
Posted on Monday 12 December 2005 - 22:39:27

bullet FISMA guidance nearly complete
...ct, guidance, guidelines, compliance, omb, a-130, fips, 200, standard, processing, requirement@@@ The publication, titled “Guide for Assessing...
Posted on Thursday 01 December 2005 - 04:25:48

bullet NIST to set up Web site for products being FIPS-201-tested
NIST.GOV will be posting test results vendor smart cards and readers to see whether they conform to Federal Information Processing Standard-201 and NI...
Posted on Wednesday 30 November 2005 - 15:50:12

bullet NIST.gov releases draft of Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...tute, standards, ieee, access point, adhoc, WPAN, fips, encryption, wpan, wlan, wman, wwan@@@ Draft SP 800-48 Revision 1 provides an overview of...
Posted on Wednesday 08 August 2007 - 06:17:10

bullet News Release - LogLogic Announces FISMA Control and Compliance Suite Based On NIST For Government Organizations
...s - the Federal Information Processing Standards (FIPS), the National Institute of Standards and Technology (NIST) "Recommended Security Controls for ...
Posted on Sunday 13 May 2007 - 15:19:25

bullet SANS.org SOHO Backups and Encryption article
...ould be mentioned, though TrueCrypt offers a NIST FIPS approved algorithm (AES) the application is not on the NIST.gov Advanced Encryption Standard Al...
Posted on Monday 11 September 2006 - 17:05:55

Go to page       >>  
Results in Forum
No matches found
Results in Comments
No matches found
Results in Other Pages
No matches found
Results in Bugtracker2
No matches found
Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations
»NIST Announces FY 2014 Small Business Innovation Research Awards
»NIST Helps Develop New Standard for Microsensor Technology
»New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees
»NIST Team Honored for Work on Military Smartphone Apps, Security
»NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do
»NIST, IAPP Host Privacy Engineering Workshop in September 2014
»NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers
»NIST aposGlobal City Teams Challengeapos to Create Smart Cities
»Global City Teams Challenge Workshop
»Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls
»Registration Opens for the Next Cybersecurity Framework Workshop
»NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security
»Digital Crime-Fighters Face Technical Challenges with Cloud Computing
»Safeguarding Health Information Building Assurance through HIPAA Security September 2014


Date published: not known
Details

»Adobe Releases Security Updates for Adobe Reader and Acrobat
Original release date: September 16, 2014 Adobe has released security updates for Adobe Reade ...
»Cisco Integrated Management Controller Vulnerability
Original release date: September 11, 2014 Cisco has released an advisory to address a vulnera ...
»Google Releases Security Update for Chrome
Original release date: September 10, 2014 Google has released Chrome 37.0.2062.120 for Window ...
»Adobe Releases Security Updates for Flash Player and Air
Original release date: September 09, 2014 Adobe has released security updates to address mult ...
»Microsoft Releases September 2014 Security Bulletin
Original release date: September 09, 2014 Microsoft released updates to address vulnerabiliti ...
»WordPress Releases Security Update
Original release date: September 04, 2014 WordPress 3.9.2 has been released to address multip ...
»Mozilla Releases Security Updates for Firefox and Thunderbird
Original release date: September 03, 2014 The Mozilla Foundation has released security update ...
»Google Releases Security Updates for Chrome
Original release date: August 27, 2014 Google has released Chrome 37.0.2062.94 for Windows, M ...
»Backoff Point-of-Sale Malware Campaign
Original release date: August 22, 2014 US-CERT is aware of Backoff malware compromising a sig ...
»Breach of Patient Identification Information
Original release date: August 18, 2014 US-CERT is aware of a breach of sensitive patient iden ...


Date published: not known
Details

»VB2014 preview: keynote and closing panel
Vulnerability disclosure one of the hottest issues in security. In the proceedings of the 24th Virus ...
»Report: VB100 comparative review on Windows Server 2012
23 out of 29 tested products earn VB100 award. Windows Server 2012 is the server version of Windows ...
»VB2014 preview: Apple without a shell - iOS under targeted attack
FireEye researchers show a large attack vector for Apple's mobile operating system. In the weeks run ...
»DNS cache poisoning used to steal emails
Call to use end-to-end encryption and to deploy DNSSEC. DNS is sometimes called 'the phone book of t ...
»Paper: Prosecting the Citadel botnet - revealing the dominance of the Zeus descendent: part two
Aditya K. Sood and Rohit Bansal study the malware's behaviour when ran on a physical machine. Last w ...
»Left-to-right override makes a return in spam
Trick shows that spammers still try to beat content-based filters. A decade ago, when spam had becom ...
»Crypto blunder makes TorrentLocker easy to crack
Use of single XOR key leaves ransomware open to known-plaintext attack. It has been said many times ...
»VB2014 preview: The three levels of exploit testing
Richard Ford and Marco Carvalho present an idea for how to test products that claim to detect the un ...
»VB2014 preview: last-minute papers added to the programme
Hot topics to be covered at VB2014 conference in Seattle. Although most of the VB2014 conference pr ...


Date published: not known
Details

»Meet The Next Next-Gen Firewall
Or at least the latest iteration of one of the oldest-running security tools that continues to evolv ...
»Browser Vulnerability 'Privacy Disaster' For 3 Of 4 Android Users
An exploit of an unsupported Android browser bypasses the ever-important Same Origin Policy.
»New CVE Naming Convention Could Break Vulnerability Management
MITRE sets deadline for releasing new CVEs with different ID format syntax, regardless of how many v ...
»Black Hat Europe 2014: An Ounce of Prevention
Some say defense is the best offense. This week we turn to the flipside of last week's nasty exploit ...
»DR Radio: A Grown-Up Conversation About Passwords
Cormac Herley of Microsoft Research will challenge everything you think you know about password mana ...
»In Defense Of Passwords
Long live the password (as long as you use it correctly along with something else).
»Worm Illuminates Potential NAS Nightmare
A researcher at Black Hat Europe hopes to demonstrate a homegrown, self-replicating worm to illustra ...
»Internet Of Things Devices Are Doomed
Security researchers hack Canon printer firmware to run the classic 90s video game Doom as well as t ...
»5 Myths: Why We Are All Data Security Risks
I am absolutely sure that I could be tricked by a well-crafted spear phishing attack, and I am equal ...


Date published: Tue, 16 Sep 2014 22:30:54 EDT
Details
Main Menu
· Home
Current Security News
 
SANS Internet Storm Center, InfoCON: green

» Infocon: green

» ISC StormCast for Wednesday, September 17th 2014 http://isc.sans.edu/podcastdetail.html?id=4151, (Wed, Sep 17th)
[16 Sep 2014 06:44pm]

» FreeBSD Denial of Service advisory (CVE-2004-0230), (Tue, Sep 16th)
[16 Sep 2014 04:54pm]

» New version of Wireshark is available --> https://www.wireshark.org/news/20140916.html, (Tue, Sep 16th)
[16 Sep 2014 04:21pm]

» https://yourfakebank.support -- TLD confusion starts!, (Tue, Sep 16th)
[16 Sep 2014 03:24pm]

» Adobe updates, Reader and Acrobat --> http://helpx.adobe.com/security/products/reader/apsb14-20.html, (Tue, Sep 16th)
[16 Sep 2014 03:01pm]

» ISC StormCast for Tuesday, September 16th 2014 http://isc.sans.edu/podcastdetail.html?id=4149, (Tue, Sep 16th)
[15 Sep 2014 09:03pm]

» Spoofed SNMP Messages: Mercy Killings of Vulnerable Networks or Troll?, (Mon, Sep 15th)
[15 Sep 2014 08:50pm]

***
CNET News.com

» Microsoft defends opening Hotmail account of blogger in espionage case
[20 Mar 2014 06:47pm]

» Syria's Internet goes dark for several hours
[20 Mar 2014 04:25pm]

» Symantec fires CEO Steve Bennett
[20 Mar 2014 03:07pm]

» Microsoft sniffed blogger's Hotmail account to trace leak
[20 Mar 2014 01:28pm]

» Microsoft sniffed private Hotmail account to trace trade secret leak
[20 Mar 2014 01:28pm]

» IBM's new services zero in on fraud, financial crime
[20 Mar 2014 07:31am]

» Despite assault on privacy, Page sees value in online openness
[19 Mar 2014 08:00pm]

» Hackers transform EA Web page into Apple ID phishing scheme
[19 Mar 2014 05:21pm]

» NSA top lawyer says tech giants knew about data collection
[19 Mar 2014 02:57pm]

» Microsoft touts study showing the cost of pirated software
[19 Mar 2014 06:55am]

» Microsoft touts study showing cost of malware in pirated software
[19 Mar 2014 06:55am]

» How to spy on your lover, the smartphone way
[18 Mar 2014 01:24pm]

» Mt. Gox update lets users see their Bitcoin balances
[18 Mar 2014 06:38am]

» Fake Malaysia Airlines links spread malware
[17 Mar 2014 05:12pm]

» IBM: No, we did not help NSA spy on customers
[17 Mar 2014 01:15pm]

***

***



***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News
Welcome
Username:

Password:


Remember me

[ ]
[ ]
[ ]

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}