Privacy-Enhancing Cryptography to Complement Differential PrivacyIn previous posts we discussed many aspects of differential privacy: what it is, what it is useful for, and how it...
Year: 2022
Hot Topics in Consumer Cybersecurity Labeling – Our December 2021 Workshop
Hot Topics in Consumer Cybersecurity Labeling – Our December 2021 WorkshopOn May 12, 2021 the White House released an Executive Order (EO) on Improving the Nation’s...
How to deploy machine learning with differential privacy
How to deploy machine learning with differential privacyWe are delighted to introduce the final guest authors in our blog series, Nicolas Papernot and Abhradeep Thakurta, research...
From Bounty to Exploit: Observations About Cybercriminal Contests
From Bounty to Exploit: Observations About Cybercriminal ContestsFrom articles to hackathons, cybercriminals are resorting to crowdsourcing to find more ways to exploit systems. In this blog,...
Less Is More: Why One Antivirus Software Is All You Need
Less Is More: Why One Antivirus Software Is All You Need Personal devices and the information they carry are incredibly valuable to their owners. It is...
NIST Launches New International Cybersecurity and Privacy Resources Website
NIST Launches New International Cybersecurity and Privacy Resources WebsiteEvery day, NIST cybersecurity and privacy resources are being used throughout the world to help organizations manage cybersecurity...
Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity
Our Quest: Advancing Product Labels to Help Consumers Consider CybersecurityFor many decades, consumers have relied on labels to help them make decisions about which products to...
Where is the Origin?: QAKBOT Uses Valid Code Signing
Where is the Origin?: QAKBOT Uses Valid Code SigningCode signing certificates help us assure the file's validity and legitimacy. However, threat actors can use that against...
Help Celebrate Data Privacy Week & NIST Privacy Framework’s 2nd Birthday!
Help Celebrate Data Privacy Week & NIST Privacy Framework’s 2nd Birthday!Today’s blog celebrates Data Privacy Week, an international awareness initiative led by the National Cyber Security...
Differential Privacy: Future Work & Open Challenges
Differential Privacy: Future Work & Open ChallengesIn this series of blog posts, we have tried to give an accessible overview of the state-of-the-art in differential privacy....
NIST Seeks Input on International Aspects of the Cybersecurity Framework, Other Resources
NIST Seeks Input on International Aspects of the Cybersecurity Framework, Other ResourcesAddressing global needs is a critical part of NIST’s work in the evolution of the...
Attack Surface Management 2022 Midyear Review Part 2
Attack Surface Management 2022 Midyear Review Part 2In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in...
Cybersecurity Education and Workforce Development: Employer-Driven and Learner-Centered
Cybersecurity Education and Workforce Development: Employer-Driven and Learner-CenteredIn this installment of our 50th Anniversary of Cybersecurity series, we hear from NIST’s Rodney Petersen, Director of the...
Celebrating 50 Years of Cybersecurity at NIST!
Celebrating 50 Years of Cybersecurity at NIST!With each day bringing new cybersecurity challenges and advances, it is easy to understand why people feel like it’s hard...
The Application of Cybersecurity for IoT Capabilities to Real-World Scenarios
The Application of Cybersecurity for IoT Capabilities to Real-World ScenariosNIST has a history of collaboration between its programs, which helps maximize project impacts and practicality to...
A Peek at Privacy: Where We Started, Where We are Now, and What’s Next
A Peek at Privacy: Where We Started, Where We are Now, and What’s NextAs part of NIST’s 50th anniversary of cybersecurity, this month’s blog post is...
Setting off on the Journey to the NIST Cybersecurity Framework (CSF) 2.0
Setting off on the Journey to the NIST Cybersecurity Framework (CSF) 2.0Over the past few months, NIST has been seeking feedback on the use and improvements...
Comprehensive Traceability for Android Supply-Chain Security
Comprehensive Traceability for Android Supply-Chain SecurityWe discuss the importance of traceability in the world of mobile operating systems.Leer másTrend Micro Research, News, PerspectivesWe discuss the importance...
The Cornerstone of Cybersecurity – Cryptographic Standards and a 50-Year Evolution
The Cornerstone of Cybersecurity – Cryptographic Standards and a 50-Year EvolutionIn today’s connected digital world, cryptographic algorithms are implemented in every device and applied to every...
Cybersecurity for IoT: The Road We’ve Traveled, The Road Ahead
Cybersecurity for IoT: The Road We’ve Traveled, The Road AheadThe NIST Cybersecurity for IoT program published Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy...
Identity and Access Management at NIST: A Rich History and Dynamic Future
Identity and Access Management at NIST: A Rich History and Dynamic FutureDigital identity for access control is a fundamental and critical cybersecurity capability that ensures the...
Manufacturing Cybersecurity: Trends & Survey Response
Manufacturing Cybersecurity: Trends & Survey ResponseBased on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into...
NIST International Outreach Strengthened through Additional Translations and Engagement
NIST International Outreach Strengthened through Additional Translations and EngagementWith the update to the Cybersecurity Framework in full swing, NIST continues to prioritize international engagement through conversations...
Standards: The CPSO’s Best Friend
Standards: The CPSO’s Best FriendWorkshop Shines Light on Role of Standards in Cybersecurity for IoT What do Chief Product Security Officers (CPSOs) want to make their...
Next Up: Integrating Information and Communication Technology Risk Programs with Enterprise Risk Management
Next Up: Integrating Information and Communication Technology Risk Programs with Enterprise Risk ManagementGiven the increasing reliance of organizations on technologies over the past 50 years, a...
NIST International Engagement Updates: CSF 2.0 Update Workshop and More
NIST International Engagement Updates: CSF 2.0 Update Workshop and MoreThe subject of international alignment and alignment with international resources continues to be an important focus for...
2022 cyber threat report details growing trends
2022 cyber threat report details growing trendsSonicWall’s mid-year report update has been released with new information on malware, ransomware, cryptojacking and more. The post 2022 cyber...
How to improve security awareness and training for your employees
How to improve security awareness and training for your employeesJust training people periodically using generic content won’t help them or your organization reduce the risk of...
The Final Countdown to Cybersecurity Awareness Month 2022: “It's easy to stay safe online!”
The Final Countdown to Cybersecurity Awareness Month 2022: “It's easy to stay safe online!”Today’s blog will jumpstart NIST’s celebration of Cybersecurity Awareness Month 2022! We have...
NIST’s Expanding International Engagement on Cybersecurity
NIST’s Expanding International Engagement on CybersecurityIn providing a foundation for cybersecurity advancements over the years, NIST has taken the global context into account when determining priorities...





