National Institute of Standards and Technology - News, Features, and Slideshows
The White House has identified cyber-physical system research and development as a "national priority" that could boost U.S. productivity. But federal spending is telling a different story.
By Patrick Thibodeau | 02 October, 2014 23:07
The National Institute of Standards and Technology needs to hire more cryptographers and improve its collaboration with the industry and academia, reducing its reliance on the U.S. National Security Agency for decisions around cryptographic standards.
By Lucian Constantin | 16 July, 2014 03:05
Now that the US National Institute of Standards and Technology has finalized the much-discussed cybersecurity framework, organizations can use it as the guideline for measuring how well their systems are secured.
By Joab Jackson | 14 February, 2014 21:47
Controversial crypto technology known as Dual EC DRBG, thought to be a backdoor for the National Security Agency, ended up in some Cisco products as part of their code libraries. But Cisco says they cannot be used because it chose other crypto as an operational default which can't be changed.
By Ellen Messmer | 17 October, 2013 20:09
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems.
By Joab Jackson | 29 August, 2013 20:59
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTStudio Design ManagerVIC
- FTAcquisition Marketing ExceutiveNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
The BYOD trend is increasing, and for good reason. Great benefits are in reach, but they will never be realised unless there is a well-written policy and a robust management platform. This guide will show you how to create a strong policy so you can reap the BYOD rewards. •Learn why you must address your BYOD policy if you want to create a peaceful, secure, and productive mobile environment •See which areas and questions you should be focusing on to build your policy •Calculate the ROI of implementing a BYOD policy rather than/in association with a corporate-owned model
- Sony confirms development of e-paper smartwatch
- Sydney Startup Weekend doubles attendance in one year
- ASIC unhappy with exclusion from data retention regime
- Australian Internet Security Initiative portal launched to help ISPs
- How SBS scaled up for FIFA World Cup online
- Hail pounds telecom networks in Queensland
- RMIT University builds virtual networking labs for students
- Weather.com fixes web application vulnerabilities
- Early version of new POS malware family spotted
- Syrian Electronic Army posts hacking message on several news sites
- Fastest LTE speed will be out of reach for most users
- EU net neutrality discussions to continue into the next year
- Over 23,000 Web servers infected with CryptoPHP backdoor
- Panasonic opens smart town targeting zero-emission houses
- Siemens patches critical SCADA flaws likely exploited in recent attacks