11:25 pm, May 23, 2015

Search Result

Search Tags:  NIST

NIST wants software to help spot smartphone security holes

The military, working through DARPA, is trying to develop its own marketplace of apps for helping troops in the field.

Tags: cybersecurity , Cybersecurity Update , technology , DoD , DARPA , Federal Drive

Monday - 08/20/2012, 08:53am EDT

NIST guidelines may force some agencies to update websites

The National Institute of Standards and Technology is working on updating guidelines for Transport Layer Security. That technology prevents anyone from eavesdropping on Internet communications.

Tags: technology , cybersecurity , Cybersecurity Upate , Federal Drive

Thursday - 08/16/2012, 09:04am EDT

NIST updates guidance for cyber response

An updated how-to guidance for responding to cyber incidents is out.

Tags: Cybersecurity Update , technology , Federal Drive

Thursday - 08/09/2012, 08:00am EDT

NIST issuing ID cards for testing

The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.

Tags: Cybersecurity Update , technology , smart card , HSPD-12 , Federal Drive

Monday - 08/06/2012, 07:35am EDT

GSA seeks input on ID management in the cloud

The General Services Administration will hold a vendor day Aug. 7 in Washington, D.C. The concept of identity management in the cloud builds on the efforts included in the National Strategy for Trusted Identities in Cyberspace (NSTIC).

Tags: technology , GSA , Deb Gallagher , Naomi Lefkovitz , identity management , cloud computing , industry , NSTIC , Jason Miller

Monday - 07/30/2012, 05:05pm EDT

NIST : Eye scans are in, fingerprints are out

The National Institute of Standards and Technology has released a new draft of its biometric identification standards.

Tags: cybersecurity , cybersecurity udpate , Federal Drive , technology

Thursday - 07/19/2012, 10:05am EDT

NIST gives agencies tips to secure mobile devices

New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.

Tags: best practices , cybersecurity , Tom Karygiannis , In Depth , mobile computing , Bring your own device , Keith BieryGolick

Wednesday - 07/18/2012, 06:29am EDT

Conference to explore agencies use of big data

How is the government using big data currently?

Tags: technology , The Big Data Report , big data , DoD , Energy , NASA , DHS , GSA ,

Wednesday - 07/11/2012, 01:43pm EDT

In Depth interviews - July 10

On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.

Tags: In Depth , Francis Rose , Hildy Ferraiolo , Tom Shoop , GovExec , Brendan McGarry , BGOV , George Tubin , Trusteer

Wednesday - 07/11/2012, 01:20am EDT

Securing your info

Christopher Fountain, senior vice president of SecureInfo joins host John Gilroy to talk about IT security.
July 10, 2012

Tags: technology , IT security , Christopher Fountain , SecureInfo Corp. , computer security , FISMA , mobile devices , mobile security , ID cards , cybersecurity , KRATOS

Tuesday - 07/10/2012, 08:01pm EDT
  • 10