NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Search NIST IT Security
Search For:   Enhanced Query Form
Search In:
 
Results 1 - 1 of 1 in Content
bullet NIST FIPS 140-2
...dules to Federal Information Processing Standard (FIPS) 140-2 and other cryptography based standards. Download the complete NIST FIPS 140-2. Plea...
Posted on Wednesday 15 November 2006 - 20:44:06 in Federal Information Processing Standards (FIPS)

bullet NIST FIPS 197 - Advanced Encryption Standard (AES)
NIST announced the approval of FIPS 197 Advance Encryption Standard (AES) November 2001. AES specifies the Rijndael encryption algorithm as a FIPS-ap...
Posted on Saturday 21 January 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet NIST SP 800-73 Interfaces for Personal Identity Verification
...ors, Federal Information Processing Standard 201 (FIPS 201) was developed to establish standards for identity credentials. This document, Special Publ...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet NIST FIPS 201 Personal Identity Verification (PIV)
...t information systems. Download the complete NIST FIPS 201 Please use the NIST.org Forum to ask questions or discuss this document. The belo...
Posted on Monday 06 February 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet Federal Information Processing Standards (FIPS)
With the passage of the Federal Information Security Management Act (FISMA) of 2002 all Federal Information Processing Standards (FIPS) are now manda...
Posted on Sunday 22 January 2006 - 16:44:21 in NIST.gov Publications

bullet Guide to NIST Computer Security Documents
In order to make NIST information security documents more accessible, especially to those just entering the security field or with limited needs for t...
Posted on Monday 30 April 2007 - 19:58:26 in NIST.gov Publications

bullet Announcing the Release of Special Publication 800-78-3
...key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances.
Posted on Saturday 03 December 2011 - 14:17:00 in NIST Computer Security Division News

bullet NIST SP 800-48 Revision 1, Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...port for Federal Information Processing Standard (FIPS) validated cryptographic algorithms. Therefore, NIST recommends that organizations with existin...
Posted on Tuesday 07 August 2007 - 22:00:00 in Draft Special Publications (SP) 800 Documents

bullet NIST SP 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
...es for PIV systems and is a companion document to FIPS 201. Download the entire NIST SP 800-78 PDF You may use the NIST.org Forum to ask question...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet Important HSPD-12 Documents and Links
... how to implement it *OMB Memorandum M-05-24 *FIPS 140-2 *FIPS 201 NIST Special Publictions *NIST SP 800-73 *NIST SP 800-76 *NIST...
Posted on Sunday 05 February 2006 - 22:00:00 in HSPD-12

Results in Links
No matches found
Results 1 - 10 of 20 in News
bullet GSA Awards Large Contracts for 10 Encryption Products
... “data at rest”. All 10 products use NIST.gov FIPS 140-2 validated encryption modules. You will be hearing much more about these products in the c...
Posted on Wednesday 20 June 2007 - 22:52:35

bullet Evidence that Encrypting Data is the Easy Part
...a, classified, data, top, secret, key, truecrypt, fips, 140-2, fbi, keylogger, chi, mak, tai, security, china, aes, aes256, aes128, blowfish, CAST5, s...
Posted on Friday 25 May 2007 - 15:27:08

bullet NIST.gov releases RFID Security Publication and a NIST Security Table of Contents
..., sp, special, publication, table, contents, 800, fips@@@ NIST.gov has released NIST Special Publication (SP) 800-98, Guidelines for Securing Ra...
Posted on Tuesday 01 May 2007 - 05:56:20

bullet U.S. Government Agencies Banning Microsoft Vista
...curity, moratorium, nist, gov, dot, faa, federal, fips, aviation, administration, office, 2007, google, apps, ocio@@@ In what turning out to be...
Posted on Tuesday 13 March 2007 - 21:56:36

bullet NSA Posts Notice on ‘Suite B’ encryption
...ough the Federal Information Processing Standard (FIPS) 201 for identity cards makes no specific reference to it, said Brendan Ziolo, marketing direct...
Posted on Monday 12 December 2005 - 22:39:27

bullet FISMA guidance nearly complete
...ct, guidance, guidelines, compliance, omb, a-130, fips, 200, standard, processing, requirement@@@ The publication, titled “Guide for Assessing...
Posted on Thursday 01 December 2005 - 04:25:48

bullet NIST to set up Web site for products being FIPS-201-tested
NIST.GOV will be posting test results vendor smart cards and readers to see whether they conform to Federal Information Processing Standard-201 and NI...
Posted on Wednesday 30 November 2005 - 15:50:12

bullet NIST.gov releases draft of Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...tute, standards, ieee, access point, adhoc, WPAN, fips, encryption, wpan, wlan, wman, wwan@@@ Draft SP 800-48 Revision 1 provides an overview of...
Posted on Wednesday 08 August 2007 - 06:17:10

bullet News Release - LogLogic Announces FISMA Control and Compliance Suite Based On NIST For Government Organizations
...s - the Federal Information Processing Standards (FIPS), the National Institute of Standards and Technology (NIST) "Recommended Security Controls for ...
Posted on Sunday 13 May 2007 - 15:19:25

bullet SANS.org SOHO Backups and Encryption article
...ould be mentioned, though TrueCrypt offers a NIST FIPS approved algorithm (AES) the application is not on the NIST.gov Advanced Encryption Standard Al...
Posted on Monday 11 September 2006 - 17:05:55

Go to page       >>  
Results in Forum
No matches found
Results in Comments
No matches found
Results in Other Pages
No matches found
Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2016-2946 (tivoli_monitoring)
Stack-based buffer overflow in the ax Shared Libraries in the Agent in IBM Tivoli Monitoring (ITM) 6 ...
»CVE-2016-2955 (connections)
Cross-site scripting (XSS) vulnerability in IBM Connections 5.0 before CR4 and 5.5 before CR1 allows ...
»CVE-2016-2991 (lotus_protector_for_mail_security)
Multiple cross-site scripting (XSS) vulnerabilities in IBM Lotus Protector for Mail Security 2.8.0.0 ...
»CVE-2016-2994 (urbancode_deploy)
Cross-site scripting (XSS) vulnerability in IBM UrbanCode Deploy 6.2.x before 6.2.1.2 allows remote ...
»CVE-2016-3012 (api_connect, network_path_manager)
IBM API Connect (aka APIConnect) before 5.0.3.0 with NPM before 2.2.8 includes certain internal serv ...
»CVE-2016-3033 (appscan_source)
IBM AppScan Source 8.7 through 9.0.3.3 allows remote authenticated users to read arbitrary files or ...
»CVE-2016-3044 (powerkvm)
The Linux kernel component in IBM PowerKVM 2.1 before 2.1.1.3-65.10 and 3.1 before 3.1.0.2 allows gu ...
»CVE-2016-3047 (filenet_workplace)
Open redirect vulnerability in IBM FileNet Workplace 4.0.2 through 4.0.2.14 IF001 allows remote auth ...
»CVE-2016-3055 (filenet_workplace)
IBM FileNet Workplace 4.0.2 before 4.0.2.14 LA012 allows remote authenticated users to read arbitrar ...
»CVE-2016-7171
NetApp Plug-in for Symantec NetBackup prior to version 2.0.1 makes use of a non-unique server certif ...
»CVE-2016-8740
The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configurati ...
»CVE-2016-9152
Cross-site scripting (XSS) vulnerability in ecrire/exec/plonger.php in SPIP 3.1.3 allows remote atta ...
»CVE-2016-9156 (sicam_pas)
A vulnerability in Siemens SICAM PAS (all versions including V8.08) could allow a remote attacker to ...
»CVE-2016-9157 (sicam_pas)
A vulnerability in Siemens SICAM PAS (all versions including V8.08) could allow a remote attacker to ...
»CVE-2016-9479 (b2evolution)
The "lost password" functionality in b2evolution before 6.7.9 allows remote attackers to reset arbit ...


Date published: 2016-12-06T06:00:01Z
Details

»Google Releases Security Updates for Chrome
Original release date: December 01, 2016 Google has released Chrome version 55.0.2883.75 for ...
»Mozilla Releases Security Updates
Original release date: November 30, 2016 Mozilla has released security updates to address a v ...
»US-CERT Alerts Users to Holiday Phishing Scams and Malware Campaigns
Original release date: November 30, 2016 US-CERT reminds users to remain vigilant when browsi ...
»Mozilla Releases Security Update
Original release date: November 28, 2016 Mozilla has released a security update to address a ...
»Vulnerabilities Identified in Network Time Protocol Daemon (ntpd)
Original release date: November 21, 2016 The Network Time Foundation's NTP Project has releas ...
»Symantec Releases Security Updates
Original release date: November 18, 2016 Symantec has released security updates to address a ...
»VMware Releases Security Update
Original release date: November 17, 2016 VMware has released a security update to address a v ...
»Mozilla Releases Security Updates
Original release date: November 15, 2016 Mozilla has released security updates to address mul ...
»Symantec Releases Security Updates
Original release date: November 15, 2016 Symantec has released security updates to address a ...
»Strategic Principles for Securing the IoT
Original release date: November 15, 2016 DHS has released a set of Strategic Principles for S ...


Date published: not known
Details

»More on the Moose botnet at Botconf
At Botconf 2016 this week, GoSecure researchers Masarah Paquet-Clou ...
»VB2016 paper: Defeating sandbox evasion: how to increase successful emulation rate in your virtualized environment
Today, we publish the VB2016 paper and presentation (recording) by ...
»VB2016 paper: Mobile applications: a backdoor into the Internet of Things?
While the Internet of Things blossoms with newly connected objects ...
»VB2016 paper: Wave your false flags! Deception tactics muddying attribution in targeted attacks
Today, we publish the VB2016 paper and presentation (recording) by ...
»Throwback Thursday: The Politics of Anti-Virus
President-elect of the United States Donald Trump made a number of ...
»VB2016 paper: The TAO of Automated Iframe Injectors - Building Drive-by Platforms For Fun
We publish Aditya K. Sood's VB2016 paper on the use of iframe injec ...
»“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker
An interview with VB2016’s keynote speaker Christine Whalley - Dire ...
»Throwback Thursday: Following the Breadcrumbs
In 1999, Christine Orshesky described how one large organization de ...
»VB2016 preview: Cryptography mistakes in malware
At VB2016, two talks will discuss mistakes made by malware authors ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» Google Releases Security Updates for Chrome
[01 Dec 2016 07:31pm]

» Mozilla Releases Security Updates
[30 Nov 2016 06:28pm]

» US-CERT Alerts Users to Holiday Phishing Scams and Malware Campaigns
[30 Nov 2016 10:40am]

» Mozilla Releases Security Update
[28 Nov 2016 07:57pm]

» Vulnerabilities Identified in Network Time Protocol Daemon (ntpd)
[21 Nov 2016 11:50am]

» Symantec Releases Security Updates
[18 Nov 2016 10:14am]

» VMware Releases Security Update
[17 Nov 2016 10:13am]

» Mozilla Releases Security Updates
[15 Nov 2016 05:56pm]

» Symantec Releases Security Updates
[15 Nov 2016 05:47pm]

» Strategic Principles for Securing the IoT
[15 Nov 2016 03:42pm]

***
US-CERT Alerts

» TA16-336A: Avalanche (crimeware-as-a-service infrastructure)
[30 Nov 2016 10:00pm]

» TA16-288A: Heightened DDoS Threat Posed by Mirai and Other Botnets
[14 Oct 2016 05:59pm]

» TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
[06 Sep 2016 04:29pm]

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

***
Computerworld Security

» Obama cybersecurity plan faces uncertain fate under Trump
[05 Dec 2016 04:01pm]

» Behavior analytics tools for cybersecurity move into enterprises
[05 Dec 2016 01:21pm]

» Chrome bug triggered website errors with Symantec SSL certificates
[05 Dec 2016 09:45am]

» New botnet launching daily massive DDoS attacks
[05 Dec 2016 08:17am]

» Putting security risks on simmer with Chef
[05 Dec 2016 07:12am]

» Russia claims it foiled a cyber attack from a foreign spy service
[05 Dec 2016 05:30am]

» Researchers find a way to bypass the iOS activation lock
[02 Dec 2016 12:54pm]

» Remote management app exposes millions of Android users to hacking
[02 Dec 2016 10:35am]

» ‘Distributed guessing’ attack lets hackers verify Visa card details
[02 Dec 2016 09:27am]

» Major cybercrime network Avalanche dismantled in global takedown
[01 Dec 2016 02:45pm]

» Data-wiping malware strikes Saudi government agencies
[01 Dec 2016 12:32pm]

» AWS tries to protect its customers from DDoS attacks with new service
[01 Dec 2016 11:47am]

» What’s in store for tech in 2017
[01 Dec 2016 10:25am]

» Implantable medical devices can be hacked to harm patients
[01 Dec 2016 09:23am]

» Security Sessions: Lessons learned from the Dyn DNS attacks
[01 Dec 2016 06:00am]

***
Microsoft Security Advisories

» 3181759 - Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege - Version: 1.0
[13 Sep 2016 11:00am]

» 3174644 - Updated Support for Diffie-Hellman Key Exchange - Version: 1.0
[13 Sep 2016 11:00am]

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

***
WIRED

» Obama Has a Plan to Fix Cybersecurity, But Its Success Depends on Trump
[05 Dec 2016 08:37am]

» Never Ever (Ever) Download Android Apps Outside of Google Play
[04 Dec 2016 05:00am]

» Security News This Week: A Botnet Takes Down Nearly a Million German Routers
[03 Dec 2016 05:00am]

» It Took 4 Years to Take Down ‘Avalanche,’ a Huge Online Crime Ring
[02 Dec 2016 05:00am]

» Ross Ulbricht’s Lawyers Say They’ve Found Another Corrupt Agent in Silk Road Case
[29 Nov 2016 12:14pm]

» Hacker Lexicon: What Is Perfect Forward Secrecy?
[28 Nov 2016 05:00am]

» Jill Stein Filed for a Recount in Wisconsin. What Now?
[25 Nov 2016 04:22pm]

» Binge-Watch the Year’s Best Hacker TV and Films This Weekend
[25 Nov 2016 05:00am]

» 3 Ways to Boost Your Family’s Online Security This Holiday
[24 Nov 2016 05:00am]

» Hacked or Not, Audit This Election (And All Future Ones)
[23 Nov 2016 01:06pm]

***
Network World Security

» Privacy groups urge investigation of 'internet of toys'
[05 Dec 2016 10:05pm]

» Facebook, Twitter, Microsoft and YouTube will share terror content info
[05 Dec 2016 09:12pm]

» Obama's cybersecurity plan faces uncertainty with Trump
[05 Dec 2016 04:01pm]

» Behavior analytics tools for cybersecurity move into enterprises
[05 Dec 2016 02:08pm]

» Beat the bad guys at their own game with SafeBreach’s simulated cyberattacks
[31 Oct 2016 04:15am]

» REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers
[25 Oct 2016 05:59am]

» Better safe than sorry: 5 apps for encrypting and shredding files
[24 Oct 2016 05:59am]

» Roqos Core router combines cybersecurity with parental controls
[18 Oct 2016 07:01am]

» 5 tools for making sense of system logs
[17 Oct 2016 07:33am]

» Check Point SandBlast takes endpoint protection to another level
[17 Oct 2016 03:59am]

» Open source routers deliver low cost, flexibility
[12 Sep 2016 04:00am]

» Review: 5 open source alternatives for routers/firewalls
[12 Sep 2016 04:00am]

» Review: SentinelOne blocks and dissects threats
[31 Aug 2016 05:40am]

» Facebook, Twitter, Microsoft and YouTube will share terror content info
[05 Dec 2016 09:12pm]

» Obama's cybersecurity plan faces uncertainty with Trump
[05 Dec 2016 04:01pm]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Welcome
Username:

Password:




Remember me

[ ]

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}