NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Search NIST IT Security
Search For:   Enhanced Query Form
Search In:
 
Results 1 - 1 of 1 in Content
bullet NIST FIPS 140-2
...dules to Federal Information Processing Standard (FIPS) 140-2 and other cryptography based standards. Download the complete NIST FIPS 140-2. Plea...
Posted on Wednesday 15 November 2006 - 20:44:06 in Federal Information Processing Standards (FIPS)

bullet NIST FIPS 197 - Advanced Encryption Standard (AES)
NIST announced the approval of FIPS 197 Advance Encryption Standard (AES) November 2001. AES specifies the Rijndael encryption algorithm as a FIPS-ap...
Posted on Saturday 21 January 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet NIST SP 800-73 Interfaces for Personal Identity Verification
...ors, Federal Information Processing Standard 201 (FIPS 201) was developed to establish standards for identity credentials. This document, Special Publ...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet NIST FIPS 201 Personal Identity Verification (PIV)
...t information systems. Download the complete NIST FIPS 201 Please use the NIST.org Forum to ask questions or discuss this document. The belo...
Posted on Monday 06 February 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet Federal Information Processing Standards (FIPS)
With the passage of the Federal Information Security Management Act (FISMA) of 2002 all Federal Information Processing Standards (FIPS) are now manda...
Posted on Sunday 22 January 2006 - 16:44:21 in NIST.gov Publications

bullet Guide to NIST Computer Security Documents
In order to make NIST information security documents more accessible, especially to those just entering the security field or with limited needs for t...
Posted on Monday 30 April 2007 - 19:58:26 in NIST.gov Publications

bullet Announcing the Release of Special Publication 800-78-3
...key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances.
Posted on Saturday 03 December 2011 - 14:17:00 in NIST Computer Security Division News

bullet NIST SP 800-48 Revision 1, Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...port for Federal Information Processing Standard (FIPS) validated cryptographic algorithms. Therefore, NIST recommends that organizations with existin...
Posted on Tuesday 07 August 2007 - 22:00:00 in Draft Special Publications (SP) 800 Documents

bullet NIST SP 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
...es for PIV systems and is a companion document to FIPS 201. Download the entire NIST SP 800-78 PDF You may use the NIST.org Forum to ask question...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet Important HSPD-12 Documents and Links
... how to implement it *OMB Memorandum M-05-24 *FIPS 140-2 *FIPS 201 NIST Special Publictions *NIST SP 800-73 *NIST SP 800-76 *NIST...
Posted on Sunday 05 February 2006 - 22:00:00 in HSPD-12

Results in Links
No matches found
Results 1 - 10 of 20 in News
bullet GSA Awards Large Contracts for 10 Encryption Products
... “data at rest”. All 10 products use NIST.gov FIPS 140-2 validated encryption modules. You will be hearing much more about these products in the c...
Posted on Wednesday 20 June 2007 - 22:52:35

bullet Evidence that Encrypting Data is the Easy Part
...a, classified, data, top, secret, key, truecrypt, fips, 140-2, fbi, keylogger, chi, mak, tai, security, china, aes, aes256, aes128, blowfish, CAST5, s...
Posted on Friday 25 May 2007 - 15:27:08

bullet NIST.gov releases RFID Security Publication and a NIST Security Table of Contents
..., sp, special, publication, table, contents, 800, fips@@@ NIST.gov has released NIST Special Publication (SP) 800-98, Guidelines for Securing Ra...
Posted on Tuesday 01 May 2007 - 05:56:20

bullet U.S. Government Agencies Banning Microsoft Vista
...curity, moratorium, nist, gov, dot, faa, federal, fips, aviation, administration, office, 2007, google, apps, ocio@@@ In what turning out to be...
Posted on Tuesday 13 March 2007 - 21:56:36

bullet NSA Posts Notice on ‘Suite B’ encryption
...ough the Federal Information Processing Standard (FIPS) 201 for identity cards makes no specific reference to it, said Brendan Ziolo, marketing direct...
Posted on Monday 12 December 2005 - 22:39:27

bullet FISMA guidance nearly complete
...ct, guidance, guidelines, compliance, omb, a-130, fips, 200, standard, processing, requirement@@@ The publication, titled “Guide for Assessing...
Posted on Thursday 01 December 2005 - 04:25:48

bullet NIST to set up Web site for products being FIPS-201-tested
NIST.GOV will be posting test results vendor smart cards and readers to see whether they conform to Federal Information Processing Standard-201 and NI...
Posted on Wednesday 30 November 2005 - 15:50:12

bullet NIST.gov releases draft of Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...tute, standards, ieee, access point, adhoc, WPAN, fips, encryption, wpan, wlan, wman, wwan@@@ Draft SP 800-48 Revision 1 provides an overview of...
Posted on Wednesday 08 August 2007 - 06:17:10

bullet News Release - LogLogic Announces FISMA Control and Compliance Suite Based On NIST For Government Organizations
...s - the Federal Information Processing Standards (FIPS), the National Institute of Standards and Technology (NIST) "Recommended Security Controls for ...
Posted on Sunday 13 May 2007 - 15:19:25

bullet SANS.org SOHO Backups and Encryption article
...ould be mentioned, though TrueCrypt offers a NIST FIPS approved algorithm (AES) the application is not on the NIST.gov Advanced Encryption Standard Al...
Posted on Monday 11 September 2006 - 17:05:55

Go to page       >>  
Results in Forum
No matches found
Results in Comments
No matches found
Results in Other Pages
No matches found
Results in Bugtracker2
No matches found
Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»Spotlight on Commerce: Donna F. Dodson
»Lack of Effective Timing Signals Could Hamper Internet of Things Development
»NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience
»NCCoE Speaker Series March 2015
»New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity
»NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems
»Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems
»NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review
»Cybersecurity Summit Technical Workshop
»NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015
»NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process
»Open-Source Software for Quantum Information
»NIST Requests Round Two Comments on its Cryptographic Standards Process
»Symposium to Focus on Future of Voting Systems
»NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix


Date published: not known
Details

»Cisco Releases Semiannual IOS Software Security Advisory Bundled Publication
Original release date: March 26, 2015 Cisco has released its semiannual Cisco IOS Software Se ...
»Installer Hijacking Vulnerability in Android Devices
Original release date: March 24, 2015 A vulnerability in Google's Android OS has been discove ...
»Apple Releases Security Update for OS X Yosemite
Original release date: March 20, 2015 Apple has released Security Update 2015-003 for OS X Yo ...
»Mozilla Releases Security Updates for Firefox, Firefox ESR, and SeaMonkey
Original release date: March 20, 2015 | Last revised: March 23, 2015 The Mozilla Foundation h ...
»Drupal Releases Security Updates
Original release date: March 19, 2015 | Last revised: March 20, 2015 Drupal has released upda ...
»OpenSSL Patches Multiple Vulnerabilities
Original release date: March 19, 2015 OpenSSL has released new updates addressing multiple vu ...
»Ubuntu Releases Security Update
Original release date: March 19, 2015 Ubuntu has released a security update to address multip ...
»Apple Releases Security Updates for Safari
Original release date: March 18, 2015 | Last revised: March 19, 2015 Apple has released secur ...
»Adobe Releases Security Updates for Flash Player
Original release date: March 12, 2015 Adobe has released security updates to address multiple ...
»Microsoft Releases March 2015 Security Bulletin and Patches FREAK
Original release date: March 10, 2015 Microsoft has released updates to address Windows vulne ...


Date published: not known
Details

»Paper: Dylib hijacking on OS X
Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks. A few years ago, DL ...
»Will DIME eventually replace email?
Protocol has all the advantages of email, yet is orders of magnitude more secure. In the current Int ...
»Paper: Windows 10 patching process may leave enterprises vulnerable to zero-day attacks
Aryeh Goretsky gives advice on how to adapt to Windows 10's patching strategy. Patching is hard, esp ...
»The ghost of Stuxnet past
Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete. Mention Stuxnet an ...
»Virus Bulletin seeks hackers, network researchers for VB2015
One week left to submit an abstract for the 25th Virus Bulletin conference. A few weeks ago, I made ...
»Canadian firm fined $1.1m for breaching anti-spam law
First success story for long-awaited CASL. The Canadian Radio-television and Telecommunications Comm ...
»VB2014 paper: Leaving our ZIP undone: how to abuse ZIP to deliver malware apps
Gregory Panakkal explains that there are different ways of looking at APK files - and that sometimes ...
»FREAK attack takes HTTPS connections back to 1990s security
Golden keys from the (first) crypto wars have come back to haunt us. When a web client makes a secur ...
»Paper: Script in a lossy stream
Dénes Óvári explains how to store code in lossily compressed JPEG data. Malformed PDF ...


Date published: not known
Details

»Hotel Router Vulnerability A Reminder Of Untrusted WiFi Risks
A flaw in a popular router product may have exposed millions of hotel guests, says Cylance
»Black Hat USA 2015: Defensive Bonus +3
Defense never seems to garner quite as much glory as offense, but good home-base security is what ke ...
»Cyber Hunting: 5 Tips To Bag Your Prey
Knowing the lay of the land and where attackers hide is a key element in hunting, both in nature and ...
»SSL/TLS Suffers 'Bar Mitzvah Attack'
Researcher at Black Hat Asia shows how attackers could abuse a known-weak crypto algorithm to steal ...
»SDN Shows Promise For Security
Improved security is emerging as a major reason for adopting software-defined networking, but concer ...
»Researchers Use Heat To Breach Air-Gapped Systems
BitWhisper project is part of ongoing air gap security research at Israel's Ben-Gurion University
»FBI Threat Intelligence Cyber-Analysts Still Marginalized In Agency
Despite good progress, 9/11 Review Commission says that analysts could have a greater impact on FBI ...
»Preparing for a Breach: The Charge of the Security Brigade
Automation is key to shorter response times and better containment.
»Black Hat USA 2015: Caution: Disassembly Imminent
The ability to reverse-engineer binary software components is more than just a fun party trick -- it ...


Date published: Sun, 29 Mar 2015 01:14:05 EDT
Details
Main Menu
· Home
Current Security News
 
SANS Internet Storm Center, InfoCON: green

» Infocon: green

» Friday Digest - 27 MAR 2015, (Fri, Mar 27th)
[27 Mar 2015 06:59pm]

» ISC StormCast for Friday, March 27th 2015 http://isc.sans.edu/podcastdetail.html?id=4415, (Fri, Mar 27th)
[26 Mar 2015 09:01pm]

» ISC StormCast for Thursday, March 26th 2015 http://isc.sans.edu/podcastdetail.html?id=4413, (Thu, Mar 26th)
[25 Mar 2015 09:16pm]

» Pin-up on your Smartphone!, (Thu, Mar 26th)
[25 Mar 2015 06:59pm]

» Nmap/Google Summer of Code, (Wed, Mar 25th)
[25 Mar 2015 10:06am]

» F-Secure: FSC-2015-2: PATH TRAVERSAL VULNERABILITY, (Wed, Mar 25th)
[25 Mar 2015 09:20am]

» PHP 5.5.23 is available, (Wed, Mar 25th)
[25 Mar 2015 08:55am]

» ISC StormCast for Wednesday, March 25th 2015 http://isc.sans.edu/podcastdetail.html?id=4411, (Wed, Mar 25th)
[24 Mar 2015 09:19pm]

» Repurposing Logs, (Tue, Mar 24th)
[24 Mar 2015 10:11am]

» ISC StormCast for Tuesday, March 24th 2015 http://isc.sans.edu/podcastdetail.html?id=4409, (Tue, Mar 24th)
[23 Mar 2015 09:20pm]

***
CNET News.com

» Microsoft defends opening Hotmail account of blogger in espionage case
[20 Mar 2014 06:47pm]

» Syria's Internet goes dark for several hours
[20 Mar 2014 04:25pm]

» Symantec fires CEO Steve Bennett
[20 Mar 2014 03:07pm]

» Microsoft sniffed blogger's Hotmail account to trace leak
[20 Mar 2014 01:28pm]

» Microsoft sniffed private Hotmail account to trace trade secret leak
[20 Mar 2014 01:28pm]

» IBM's new services zero in on fraud, financial crime
[20 Mar 2014 07:31am]

» Despite assault on privacy, Page sees value in online openness
[19 Mar 2014 08:00pm]

» Hackers transform EA Web page into Apple ID phishing scheme
[19 Mar 2014 05:21pm]

» NSA top lawyer says tech giants knew about data collection
[19 Mar 2014 02:57pm]

» Microsoft touts study showing the cost of pirated software
[19 Mar 2014 06:55am]

» Microsoft touts study showing cost of malware in pirated software
[19 Mar 2014 06:55am]

» How to spy on your lover, the smartphone way
[18 Mar 2014 01:24pm]

» Mt. Gox update lets users see their Bitcoin balances
[18 Mar 2014 06:38am]

» Fake Malaysia Airlines links spread malware
[17 Mar 2014 05:12pm]

» IBM: No, we did not help NSA spy on customers
[17 Mar 2014 01:15pm]

***

***



***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News
Welcome
Username:

Password:


Remember me

[ ]

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}