Face morphing software, which combines photos of different people into a single image, is being used to commit identity fraud.
Four related algorithms are now ready for use to protect data created and transmitted by the Internet of Things and other electronics.
NIST has released NIST BGP RPKI IO (BRIO) - an open-source test tool and data sets to facilitate testing and experimentation with emerging Border Gateway Protocol (BGP) security and resilience mechani…
NIST has introduced NIST BGP RPKI IO (BRIO), an open-source test tool and data sets to aid in the testing and experimentation of BGP security and resilience mechanisms that use Resource Public Key Infrastructure (RPKI). This tool aims to support the advancement of secure and reliable BGP operations.
Join the NIST NCCoE soon for a series of virtual working sessions to provide input on the NIST Cybersecurity Framework (CSF) Cyber Artificial Intelligence (AI) Profile (“Cyber AI Profile). These will …
CAISI and NIST hosted an AISIC workshop with approximately 140 experts in January.
The NIST National Cybersecurity Center of Excellence (NCCoE) has released a second public draft of NIST Internal Report 8536, Supply Chain Traceability: Manufacturing Meta-Framework for public comment…
NIST is soliciting comments from the public on the draft until Sept. 12, and the agency is planning a virtual event to showcase the project and gather feedback on Aug. 27.
Earlier this year, the NIST National Cybersecurity Center of Excellence published an initial public draft of NIST Interagency Report (NIST IR) 8374 Revision 1, Ransomware Risk Management: A Cybersecur…
NIST has issued draft updates to Special Publication (SP) 800-53 to provide additional guidance on how to securely and reliably deploy patches and updates in response to the Executive Order 14306, Sus…