National Institute of Standards and Technology

  • The National Institute of Standards and Technology produces prodigious amounts of data. Now it wants your help to make that data more accessible. NIST has launched a contest to create and design an app using some of its data sets. Heather Evans is a challenge manager at NIST. She joined the Federal Drive with Tom Temin with more on the contest.

    July 31, 2015
  • The Office of Management and Budget is working on new cybersecurity guidelines for contractors in the wake of two major breaches. Contractors already have five major expectations for their own cyber programs from the National Institute of Standards and Technology. Larry Allen is president of Allen Federal Business Partners and writes the Week Ahead newsletter. He tells In Depth with Francis Rose that your company can't get into the cybersecurity game without perfecting and securing its own network first.

    July 30, 2015
  • People use mobile devices for almost everything nowadays — sometimes even for viewing sensitive information. It's not just the intelligence community that needs to keep its devices protected. Medical providers need a middle ground between security and convenience as well. To that end, the National Cybersecurity Center of Excellence has released a new set of rules to help health care providers keep their mobile devices as secure as possible. Gavin O'Brien is a project manager at NCCoE. He joined Tom Temin on the Federal Drive to review the new guidelines.

    July 29, 2015
  • The breaches of the Office of Personnel Management's networks underscore how vulnerable the government is to hackers. Every federal employee can strengthen or weaken the government's cybersecurity. Federal News Radio's Emily Kopp asked two experts to share some tips for being safe online during a training conference hosted by Gov Loop. The first voice you'll hear is Kristina Dorville, the Homeland Security Department’s branch chief for cyber education and awareness. We'll also hear from Celia Paulsen, an IT security specialist at the National Institute of Standards and Technology.

    July 23, 2015
  • The Defense Department and the National Institute of Standards and Technology provided a lift to the future of mobile computing in the government. DoD announced it moved its classified mobile capability from a pilot stage…

    June 30, 2015
  • Your mom told you not to get a tattoo. Now that magnificent body art could become a sort of biometric identifier for law enforcement. The National Institutes of Standards and Technology and the FBI want to use tattoos to help identify people, be they suspects or victims of natural disasters. NIST shared some of the initial results of its research at a recent workshop. Mei Ngan is a computer scientist with NIST. She joined the Federal Drive with Tom Temin with more on the identification efforts.

    June 16, 2015
  • A recent cyber breach leaves the Internal Revenue Service with more questions than answers about its online authentication system. But the IRS knows the data systems it built decades ago aren\'t useful any more. Visitors to the agency\'s Get Transcript portal are easy targets, because hackers already knew the answers to many of the knowledge based authentication questions they answered to enter the portal. Jeremy Grant, an identity management consultant and former senior executive advisor for identity management at the National Institute of Standards and Technology, tells In Depth with Francis Rose about what lessons government learn about identity management.

    June 03, 2015
  • The National Institute of Standards and Technology recently awarded Colorado State University $20 million toward establishing the Community Resilience Center of Excellence. When it's up and running, the center will help local governments decide how to best prepare for, and recover from, extreme weather or other disasters. Terri McAllister, a research structural engineer at NIST, joined Tom Temin on the Federal Drive with more on the center.

    March 06, 2015
  • After four years leading the government efforts come up with an alternative to the password, Jeremy Grant is leaving government. He's a Senior Executive Advisor for Identity Management at the National Insitute of Standards and Technology. In an email to his colleagues, he says he's unsure where he'll go next, but plans to leave NIST in April. He joined the Federal Drive with Tom Temin in studio to reflect on progress in identity management and some of the success stories.

    February 24, 2015
  • Jeremy Grant has led the National Strategy for Trusted Identities in Cyberspace (NSTIC) program since 2011. His last day will be in April.

    February 19, 2015
  • The Defense Department's National Information Assurance Partnership's (NIAP) protection profile will be the governmentwide standard for agencies to use when ensuring the security of mobile apps. The Mobile Technology Tiger Team recommended the NIAP approach because of the collaboration and coordination across government and with industry.

    February 19, 2015
  • If recent events on the cybersecurity front have scared the heck out of you, well, good. There's a lot you can do. How about start by reading the latest version of the government's premier publications on how to assess whether your security and privacy controls are adequate for today's hacker-plagued world? Dr. Ron Ross, FISMA Implementation Project and Joint Task Force Leader at the National Institute of Standards and Technology, joined Tom Temin on the Federal Drive to discuss what's in the newest revision of Special Publication 800-53-A.

    December 19, 2014
  • When architects and engineers design buildings, they have to meet local building codes. But, simply meeting those codes won't ensure you have the most efficient design for the long haul. Joshua Kneifel is a research economist in the engineering laboratory at the National Institute of Standards and Technology. On the Federal Drive with Tom Temin, he told Federal News Radio's Lauren Larson about a new tool NIST engineers developed that lets builders measure the economic and environmental impacts of everything from the floor to the roof.

    December 01, 2014
  • Non-federal organizations and contractors may have sensitive federal information on their computers, but there are no consistent rules on how to keep that information secure. The treatment of Controlled Unclassified Information is the focus of a new set of recommendations. Ron Ross is a National Institute of Standards and Technology fellow. He is the lead author of the new guide, and joined Tom Temin on the Federal Drive to explain more.

    November 24, 2014