NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Search NIST IT Security
Search For:   Enhanced Query Form
Search In:
 
Results 1 - 1 of 1 in Content
bullet NIST FIPS 140-2
...dules to Federal Information Processing Standard (FIPS) 140-2 and other cryptography based standards. Download the complete NIST FIPS 140-2. Plea...
Posted on Wednesday 15 November 2006 - 20:44:06 in Federal Information Processing Standards (FIPS)

bullet NIST FIPS 197 - Advanced Encryption Standard (AES)
NIST announced the approval of FIPS 197 Advance Encryption Standard (AES) November 2001. AES specifies the Rijndael encryption algorithm as a FIPS-ap...
Posted on Saturday 21 January 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet NIST SP 800-73 Interfaces for Personal Identity Verification
...ors, Federal Information Processing Standard 201 (FIPS 201) was developed to establish standards for identity credentials. This document, Special Publ...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet NIST FIPS 201 Personal Identity Verification (PIV)
...t information systems. Download the complete NIST FIPS 201 Please use the NIST.org Forum to ask questions or discuss this document. The belo...
Posted on Monday 06 February 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet Federal Information Processing Standards (FIPS)
With the passage of the Federal Information Security Management Act (FISMA) of 2002 all Federal Information Processing Standards (FIPS) are now manda...
Posted on Sunday 22 January 2006 - 16:44:21 in NIST.gov Publications

bullet Guide to NIST Computer Security Documents
In order to make NIST information security documents more accessible, especially to those just entering the security field or with limited needs for t...
Posted on Monday 30 April 2007 - 19:58:26 in NIST.gov Publications

bullet Announcing the Release of Special Publication 800-78-3
...key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances.
Posted on Saturday 03 December 2011 - 14:17:00 in NIST Computer Security Division News

bullet NIST SP 800-48 Revision 1, Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...port for Federal Information Processing Standard (FIPS) validated cryptographic algorithms. Therefore, NIST recommends that organizations with existin...
Posted on Tuesday 07 August 2007 - 22:00:00 in Draft Special Publications (SP) 800 Documents

bullet NIST SP 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
...es for PIV systems and is a companion document to FIPS 201. Download the entire NIST SP 800-78 PDF You may use the NIST.org Forum to ask question...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet Important HSPD-12 Documents and Links
... how to implement it *OMB Memorandum M-05-24 *FIPS 140-2 *FIPS 201 NIST Special Publictions *NIST SP 800-73 *NIST SP 800-76 *NIST...
Posted on Sunday 05 February 2006 - 22:00:00 in HSPD-12

Results in Links
No matches found
Results 1 - 10 of 20 in News
bullet GSA Awards Large Contracts for 10 Encryption Products
... “data at rest”. All 10 products use NIST.gov FIPS 140-2 validated encryption modules. You will be hearing much more about these products in the c...
Posted on Wednesday 20 June 2007 - 22:52:35

bullet Evidence that Encrypting Data is the Easy Part
...a, classified, data, top, secret, key, truecrypt, fips, 140-2, fbi, keylogger, chi, mak, tai, security, china, aes, aes256, aes128, blowfish, CAST5, s...
Posted on Friday 25 May 2007 - 15:27:08

bullet NIST.gov releases RFID Security Publication and a NIST Security Table of Contents
..., sp, special, publication, table, contents, 800, fips@@@ NIST.gov has released NIST Special Publication (SP) 800-98, Guidelines for Securing Ra...
Posted on Tuesday 01 May 2007 - 05:56:20

bullet U.S. Government Agencies Banning Microsoft Vista
...curity, moratorium, nist, gov, dot, faa, federal, fips, aviation, administration, office, 2007, google, apps, ocio@@@ In what turning out to be...
Posted on Tuesday 13 March 2007 - 21:56:36

bullet NSA Posts Notice on ‘Suite B’ encryption
...ough the Federal Information Processing Standard (FIPS) 201 for identity cards makes no specific reference to it, said Brendan Ziolo, marketing direct...
Posted on Monday 12 December 2005 - 22:39:27

bullet FISMA guidance nearly complete
...ct, guidance, guidelines, compliance, omb, a-130, fips, 200, standard, processing, requirement@@@ The publication, titled “Guide for Assessing...
Posted on Thursday 01 December 2005 - 04:25:48

bullet NIST to set up Web site for products being FIPS-201-tested
NIST.GOV will be posting test results vendor smart cards and readers to see whether they conform to Federal Information Processing Standard-201 and NI...
Posted on Wednesday 30 November 2005 - 15:50:12

bullet NIST.gov releases draft of Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...tute, standards, ieee, access point, adhoc, WPAN, fips, encryption, wpan, wlan, wman, wwan@@@ Draft SP 800-48 Revision 1 provides an overview of...
Posted on Wednesday 08 August 2007 - 06:17:10

bullet News Release - LogLogic Announces FISMA Control and Compliance Suite Based On NIST For Government Organizations
...s - the Federal Information Processing Standards (FIPS), the National Institute of Standards and Technology (NIST) "Recommended Security Controls for ...
Posted on Sunday 13 May 2007 - 15:19:25

bullet SANS.org SOHO Backups and Encryption article
...ould be mentioned, though TrueCrypt offers a NIST FIPS approved algorithm (AES) the application is not on the NIST.gov Advanced Encryption Standard Al...
Posted on Monday 11 September 2006 - 17:05:55

Go to page       >>  
Results in Forum
No matches found
Results in Comments
No matches found
Results in Other Pages
No matches found
Results in Bugtracker2
No matches found
Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems
»Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How
»2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative
»UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science
»NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans
»NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence
»NCCoE Fall Open House
»NCCoE Seeks Comments on Mobile Device Security Building Block
»Three Pilot Projects Receive Grants to Improve Online Security and Privacy
»NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations
»NIST Announces FY 2014 Small Business Innovation Research Awards
»NIST Helps Develop New Standard for Microsensor Technology
»New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees
»NIST Team Honored for Work on Military Smartphone Apps, Security
»NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do


Date published: not known
Details

»WordPress Releases Security Update
Original release date: November 21, 2014 WordPress 4.0.1 has been released to address multipl ...
»Drupal Releases Security Advisory
Original release date: November 20, 2014 Drupal has released an advisory to address multiple ...
»Google Releases Security Update for Chrome
Original release date: November 19, 2014 Google has released Chrome 39.0.2171.65 for Windows, ...
»Microsoft Releases Out-of-Band Security Bulletin for Windows Kerberos Vulnerability
Original release date: November 18, 2014 | Last revised: November 19, 2014 Microsoft has rele ...
»IC3 Releases Scam Alert for Fraudulent Online Advertisements
Original release date: November 18, 2014 The Internet Crime Complaint Center (IC3) released a ...
»Apple Releases Security Updates for iOS, OS X Yosemite, and Apple TV
Original release date: November 17, 2014 Apple released security updates for iOS devices, OS ...
»IC3 Releases “Tech Support” Themed Scam Alert
Original release date: November 13, 2014 The Internet Crime Complaint Center (IC3), a partner ...
»Google Releases Security Update for Chrome
Original release date: November 11, 2014 Google has released Chrome 38.0.2125.122 for Windows ...
»Adobe Releases Security Updates for Flash Player
Original release date: November 11, 2014 Adobe has released security updates to address multi ...
»Microsoft Releases November 2014 Security Bulletin
Original release date: November 11, 2014 Microsoft has released updates to address vulnerabil ...


Date published: not known
Details

»Botconf 2014 preview
Many VB authors and presenters to speak at second botnet-fighting conference. Last year, I attended ...
»VB2014 paper: Sweeping the IP space: the hunt for evil on the Internet
Dhia Mahjoub explains how the topology of the AS graph can be used to uncover hotspots of maliciousn ...
»Report: VB100 comparative review on Windows 8.1
40 out of 48 tested products earn VB100 award. If you follow the security news, you may believe that ...
»Out-of-band patch released for all Windows versions
Kerberos bug means one set of credentials suffices to rule them all. If you are a Windows systems ad ...
»VB2014 paper: Optimized mal-ops. Hack the ad network like a boss
Why buying ad space makes perfect sense for those wanting to spread malware. Over the next few month ...
»Book review: Bulletproof SSL and TLS
Must-read for anyone working with one of the Internet's most important protocols. I was reading Ivan ...
»VB2014 paper: Bootkits: past, present & future
Despite better defences, the era of bootkits is certainly not behind us. Over the next few months, w ...
»Stuxnet infected Natanz plant via carefully selected targets rather than escape from it
Five initial victims of infamous worm named. Today, as Wired journalist Kim Zetter publishes her boo ...
»VB2014 paper: Apple without a shell - iOS under targeted attack
Developer Enterprise Program recently found to be used by WireLurker. Over the next few months, we w ...


Date published: not known
Details

»Privacy Groups Release 'Detekt' Tool to Spot Spyware
Privacy advocates have joined together to release a tool for identifying cyber espionage malware.
»Cloud Security By The Numbers
Quantifying the perceptions around cloud security practices.
»The Week When Attackers Started Winning The War On Trust
The misuse of keys and certificates is not exotic or hypothetical. It's a real threat that could und ...
»When Every Minute Counts (Part 2)
Acting on key Indicators of Attack for incident response is crucial.
»Russian Cyber Espionage Under The Microscope
New report shows level of coordination and strategy by three main groups of cyberspies out of Russia ...
»New Citadel Attack Targets Password Managers
IBM researchers have found signs that the prolific data steal Trojan is now being used to attack wid ...
»You're Doing BYOD Wrong: These Numbers Prove It
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen me ...
»Surveillance Cameras Next On The Insecure IoT List
Three buffer overflow vulnerabilities leave HikVision video recorders open to remote code execution.
»Enter The Digital Risk Officer
In the brave new world of digital risk management, a CISO would report up to a DRO who manages risk ...


Date published: Fri, 21 Nov 2014 21:38:05 EST
Details
Main Menu
· Home
Current Security News
 
SANS Internet Storm Center, InfoCON: green

» Infocon: green

» ISC StormCast for Friday, November 21st 2014 http://isc.sans.edu/podcastdetail.html?id=4247, (Fri, Nov 21st)
[20 Nov 2014 08:30pm]

» Google Web "Firing Range" Available, (Thu, Nov 20th)
[20 Nov 2014 01:03pm]

» Critical WordPress XSS Update, (Thu, Nov 20th)
[20 Nov 2014 12:42pm]

» ISC StormCast for Thursday, November 20th 2014 http://isc.sans.edu/podcastdetail.html?id=4245, (Thu, Nov 20th)
[19 Nov 2014 05:51pm]

» "Big Data" Needs a Trip to the Security Chiropracter!, (Wed, Nov 19th)
[19 Nov 2014 12:18pm]

» ISC StormCast for Wednesday, November 19th 2014 http://isc.sans.edu/podcastdetail.html?id=4243, (Wed, Nov 19th)
[18 Nov 2014 08:28pm]

» Microsoft November out-of-cycle patch MS14-068, (Tue, Nov 18th)
[18 Nov 2014 05:15pm]

» Microsoft Will Release MS14-068 Later Today, (Tue, Nov 18th)
[18 Nov 2014 09:24am]

» ISC StormCast for Tuesday, November 18th 2014 http://isc.sans.edu/podcastdetail.html?id=4241, (Tue, Nov 18th)
[17 Nov 2014 07:19pm]

» Updates for OS X , iOS and Apple TV, (Mon, Nov 17th)
[17 Nov 2014 01:22pm]

***
CNET News.com

» Microsoft defends opening Hotmail account of blogger in espionage case
[20 Mar 2014 06:47pm]

» Syria's Internet goes dark for several hours
[20 Mar 2014 04:25pm]

» Symantec fires CEO Steve Bennett
[20 Mar 2014 03:07pm]

» Microsoft sniffed blogger's Hotmail account to trace leak
[20 Mar 2014 01:28pm]

» Microsoft sniffed private Hotmail account to trace trade secret leak
[20 Mar 2014 01:28pm]

» IBM's new services zero in on fraud, financial crime
[20 Mar 2014 07:31am]

» Despite assault on privacy, Page sees value in online openness
[19 Mar 2014 08:00pm]

» Hackers transform EA Web page into Apple ID phishing scheme
[19 Mar 2014 05:21pm]

» NSA top lawyer says tech giants knew about data collection
[19 Mar 2014 02:57pm]

» Microsoft touts study showing the cost of pirated software
[19 Mar 2014 06:55am]

» Microsoft touts study showing cost of malware in pirated software
[19 Mar 2014 06:55am]

» How to spy on your lover, the smartphone way
[18 Mar 2014 01:24pm]

» Mt. Gox update lets users see their Bitcoin balances
[18 Mar 2014 06:38am]

» Fake Malaysia Airlines links spread malware
[17 Mar 2014 05:12pm]

» IBM: No, we did not help NSA spy on customers
[17 Mar 2014 01:15pm]

***

***



***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News
Welcome
Username:

Password:


Remember me

[ ]
[ ]
[ ]

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}