Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: NIST
The Postal Service has some compliance issues with its cloud computing contracts.
It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.
The National Institute of Standards and Technology kicks off the Global City Teams Challenge in September. Tech-savvy members from the federal government and private sector will come together to address issues including air quality, traffic management and emergency services coordination, all through the use of smart technology. Sokwoo Rhee, associate director for Internet of Things and Cyber-Physical Systems at NIST, joined Tom Temin on the Federal Drive to discuss what the agency hopes to accomplish.
The National Information Assurance Partnership, the U.S. implementation of what was supposed to be a faster, cheaper process to verify the cybersecurity of commercial IT products, turned out to be so slow and expensive that few companies could afford to go through it. But officials said they hope a recent overhaul in the procedures will breathe new life into the program.
Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.
The latest guide to mobile forensics from the National Institute of Standards and Technology adds hundreds of new tools for investigators to find and collect information from a mobile device. The additions come seven years after NIST first published its Guidelines on Mobile Device Forensics. To give some context, that guide came out BEFORE Apple released the first iPhone. The guide includes as many ways to keep a phone running when it has low battery to save as much data as possible. NIST plans to publish the final version later this year.
Cybersecurity projects and programs are getting some hefty backing from the Senate.
It keeps getting easier to manufacture a counterfeit computer chip. Experts say federal information systems increasingly are at risk because of flaws in their supply chains. It is not just a question of fake parts. Genuine ones that have been tampered with, or are just poorly made, can cause damage. The National Institute of Standards and Technology is revising guidelines for agencies to help them secure their supply chains. Jon Boyens is an IT specialist in the security outreach and integration group at NIST. He spoke with Emily Kopp on the Federal Drive.
The National Institute of Standards and Technology gives agencies guidance for continuing the transition to a real-time, dynamic cybersecurity.
The National Institute of Standards and Technology has launched a four-part plan to help agencies build more secure IT systems. NIST Computer Scientist Ron Ross, who guided a new publication on the issue, tells the Federal Drive with Tom Temin and Emily Kopp that the same engineering principles that apply to bridges and buildings should apply to IT. That is, security should be built in, not added later.