Help Celebrate Data Privacy Week & NIST Privacy Framework’s 2nd Birthday!Today’s blog celebrates Data Privacy Week, an international awareness initiative led by the National Cyber Security...
Month: November 2022
Differential Privacy: Future Work & Open Challenges
Differential Privacy: Future Work & Open ChallengesIn this series of blog posts, we have tried to give an accessible overview of the state-of-the-art in differential privacy....
NIST Seeks Input on International Aspects of the Cybersecurity Framework, Other Resources
NIST Seeks Input on International Aspects of the Cybersecurity Framework, Other ResourcesAddressing global needs is a critical part of NIST’s work in the evolution of the...
Attack Surface Management 2022 Midyear Review Part 2
Attack Surface Management 2022 Midyear Review Part 2In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in...
Cybersecurity Education and Workforce Development: Employer-Driven and Learner-Centered
Cybersecurity Education and Workforce Development: Employer-Driven and Learner-CenteredIn this installment of our 50th Anniversary of Cybersecurity series, we hear from NIST’s Rodney Petersen, Director of the...
Celebrating 50 Years of Cybersecurity at NIST!
Celebrating 50 Years of Cybersecurity at NIST!With each day bringing new cybersecurity challenges and advances, it is easy to understand why people feel like it’s hard...
The Application of Cybersecurity for IoT Capabilities to Real-World Scenarios
The Application of Cybersecurity for IoT Capabilities to Real-World ScenariosNIST has a history of collaboration between its programs, which helps maximize project impacts and practicality to...
A Peek at Privacy: Where We Started, Where We are Now, and What’s Next
A Peek at Privacy: Where We Started, Where We are Now, and What’s NextAs part of NIST’s 50th anniversary of cybersecurity, this month’s blog post is...
Setting off on the Journey to the NIST Cybersecurity Framework (CSF) 2.0
Setting off on the Journey to the NIST Cybersecurity Framework (CSF) 2.0Over the past few months, NIST has been seeking feedback on the use and improvements...
Comprehensive Traceability for Android Supply-Chain Security
Comprehensive Traceability for Android Supply-Chain SecurityWe discuss the importance of traceability in the world of mobile operating systems.Leer másTrend Micro Research, News, PerspectivesWe discuss the importance...
The Cornerstone of Cybersecurity – Cryptographic Standards and a 50-Year Evolution
The Cornerstone of Cybersecurity – Cryptographic Standards and a 50-Year EvolutionIn today’s connected digital world, cryptographic algorithms are implemented in every device and applied to every...
Cybersecurity for IoT: The Road We’ve Traveled, The Road Ahead
Cybersecurity for IoT: The Road We’ve Traveled, The Road AheadThe NIST Cybersecurity for IoT program published Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy...
Identity and Access Management at NIST: A Rich History and Dynamic Future
Identity and Access Management at NIST: A Rich History and Dynamic FutureDigital identity for access control is a fundamental and critical cybersecurity capability that ensures the...
Manufacturing Cybersecurity: Trends & Survey Response
Manufacturing Cybersecurity: Trends & Survey ResponseBased on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into...
NIST International Outreach Strengthened through Additional Translations and Engagement
NIST International Outreach Strengthened through Additional Translations and EngagementWith the update to the Cybersecurity Framework in full swing, NIST continues to prioritize international engagement through conversations...
Standards: The CPSO’s Best Friend
Standards: The CPSO’s Best FriendWorkshop Shines Light on Role of Standards in Cybersecurity for IoT What do Chief Product Security Officers (CPSOs) want to make their...
Next Up: Integrating Information and Communication Technology Risk Programs with Enterprise Risk Management
Next Up: Integrating Information and Communication Technology Risk Programs with Enterprise Risk ManagementGiven the increasing reliance of organizations on technologies over the past 50 years, a...
NIST International Engagement Updates: CSF 2.0 Update Workshop and More
NIST International Engagement Updates: CSF 2.0 Update Workshop and MoreThe subject of international alignment and alignment with international resources continues to be an important focus for...
2022 cyber threat report details growing trends
2022 cyber threat report details growing trendsSonicWall’s mid-year report update has been released with new information on malware, ransomware, cryptojacking and more. The post 2022 cyber...
How to improve security awareness and training for your employees
How to improve security awareness and training for your employeesJust training people periodically using generic content won’t help them or your organization reduce the risk of...
The Final Countdown to Cybersecurity Awareness Month 2022: “It's easy to stay safe online!”
The Final Countdown to Cybersecurity Awareness Month 2022: “It's easy to stay safe online!”Today’s blog will jumpstart NIST’s celebration of Cybersecurity Awareness Month 2022! We have...
NIST’s Expanding International Engagement on Cybersecurity
NIST’s Expanding International Engagement on CybersecurityIn providing a foundation for cybersecurity advancements over the years, NIST has taken the global context into account when determining priorities...
Cybersecurity Awareness Month 2022: Updating Software
Cybersecurity Awareness Month 2022: Updating SoftwareCybersecurity Awareness Month is flying by, and today’s blog identifies different security vulnerabilities that can be exposed if you are unable...
Cybersecurity Awareness Month 2022: Using Strong Passwords and a Password Manager
Cybersecurity Awareness Month 2022: Using Strong Passwords and a Password ManagerThe key behavior that we are highlighting this week for Cybersecurity Awareness Month is using strong...
Cranefly uses new communication technique in attack campaigns
Cranefly uses new communication technique in attack campaignsA threat actor dubbed "Cranefly" uses a new technique for its communications on infected targets. The post Cranefly uses...
Cybersecurity Awareness Month 2022: Enabling Multi-factor Authentication Key behavior: Multi-factor Authentication
Cybersecurity Awareness Month 2022: Enabling Multi-factor Authentication Key behavior: Multi-factor AuthenticationIn celebration of Cybersecurity Awareness Month, NIST will be publishing a dedicated blog series throughout October;...
What is data migration?
What is data migration?In business and technology, migrating data means moving it from one system or platform to another. Learn the processes and challenges of data...
ConnectWise fixes RCE bug exposing thousands of servers to attacks
ConnectWise fixes RCE bug exposing thousands of servers to attacksConnectWise has released security updates to address a critical vulnerability in the ConnectWise Recover and R1Soft Server...
Cybersecurity Awareness Month 2022: Recognizing & Reporting Phishing
Cybersecurity Awareness Month 2022: Recognizing & Reporting PhishingThis blog will officially wrap up our 2022 Cybersecurity Awareness Month blog series — today we have a special...
Student Insights on Cybersecurity Careers
Student Insights on Cybersecurity CareersHi, our names are Aubrie, Kyle, and Lindsey! We participated in internships at the National Initiative for Cybersecurity Education (NICE) Program Office...