National Institute of Standards and Technology - News, Features, and Slideshows
The White House has identified cyber-physical system research and development as a "national priority" that could boost U.S. productivity. But federal spending is telling a different story.
By Patrick Thibodeau | 02 October, 2014 23:07
The National Institute of Standards and Technology needs to hire more cryptographers and improve its collaboration with the industry and academia, reducing its reliance on the U.S. National Security Agency for decisions around cryptographic standards.
By Lucian Constantin | 16 July, 2014 03:05
Now that the US National Institute of Standards and Technology has finalized the much-discussed cybersecurity framework, organizations can use it as the guideline for measuring how well their systems are secured.
By Joab Jackson | 14 February, 2014 21:47
Controversial crypto technology known as Dual EC DRBG, thought to be a backdoor for the National Security Agency, ended up in some Cisco products as part of their code libraries. But Cisco says they cannot be used because it chose other crypto as an operational default which can't be changed.
By Ellen Messmer | 17 October, 2013 20:09
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems.
By Joab Jackson | 29 August, 2013 20:59
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
- FTStrategic Account Manager - Google AnalyticsNSW
- FTAccount Manager - DataNSW
- FTCampaign Managers | Programmatic / RTB | Display + Video | Trading desk |SydneyNSW
- FTData Product SpecialistNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTDigital Marketing CoordinatorNSW
- FTSEM Specialist - SEM AnalystNSW
- FTDigital Performance Manager - MediaNSW
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- Google extends two-factor authentication with physical USB keys
- Google, Facebook continue massive lobbying efforts in Q3
- Rimini Street's practices remain 'suspect,' Oracle alleges
- Digital rights groups ask ITU to stay out of net neutrality debate
- Workers use their own smartphones at work, without boss's knowledge
- Motorola Solutions unveils the Symbol TC70 rugged handheld
- FTC appoints privacy researcher Soltani as chief technologist
- Complaints mount about Yosemite crippling Wi-Fi
- Ethernet is coming to cars
- Cook trounces Nadella in 2014 tech pay package tussle
- Data warehouse-as-a-service startup Snowflake comes out of stealth
- Mac revenue tops iPad as Apple sells record 5.5M computers
- One week after patch, Flash vulnerability already exploited in large-scale attacks
- Keep calm and plug the holes
- Candidates for EU's data protection job heard by the European Parliament