National Institute of Standards and Technology

  • We turn next to a project of the National Institute of Standards and Technology. It's working to incorporate data from a federal, personal identification verification card, or PIV card, right into your mobile device. Federal Drive host Tom Temin spoke with the principles on this project. Vernon Lee is the Chief Technical Officer of Microsoft Civilian, Hildy Ferraiolo is a computer scientist at NIST, and Chris Edwards is the CTO at Intercede.

    September 21, 2015
  • Attorney Bob Metzger with Rogers Joseph O'Donnell, PC, joins host Roger Waldron for a wide ranging discussion of the federal government's cybersecurity policies and regulations including the new DFARS cyber rule. September 15, 2015

    September 18, 2015
  • Sol Cates, chief security officer for Vormetric, argues that while new policies and regulations are important, the answer to an organization’s cybersecurity problems starts with making a decision to dedicating more resources to solutions and less to filling out forms.

    September 15, 2015
  • A real revolution is what Nobel Prize Laureate and fellow at the National Institute of Standards and Technology William Phillips calls the field of atomtronics. He applauded the work of NIST physicist Gretchen Campbell in that field. Campbell is a Service to America Medal finalist in the Call to Service category. She says the field of atomtronics is still sort of theoretical.

    September 04, 2015
  • COMMENTARY: Ron Gula, the CEO of Tenable Network Security, makes the case for CIOs not to get overwhelmed by all the security rules and requirements and instead to focus on a few areas that can make a big difference.

    August 18, 2015
  • The Office of Management and Budget just released new guidance on protecting non-sensitive information from federal contractors. The guidance would require contractors follow National Institute for Standards and Technology standards for protecting their information.

    August 17, 2015
  • Federal contractors have new guidance for protecting government information from the CIO and CAO Councils. Contractors will have to comply with some of the same standards agencies do. Jeremy Grant is managing director at the Cheroff Group and former director of the National Strategy for Trusted Identities in Cyberspace at NIST. He tells In Depth with Francis Rose what this means for contractors who will have to comply with these NIST standards.

    August 13, 2015
  • New guidance on protecting non-sensitive information from federal contractors is out from the CIO and CAO Councils. It would require that contractors follow a specific NIST Special Publication for protecting their information. The Office of Management and Budget is asking agencies and vendors now for feedback. Final guidance is expected later in the fall. Nick Nayak is former chief procurement officer at the Homeland Security Department. He tells In Depth with Francis Rose that the councils are looking to address incident reporting, information system assessments, and information security continuous monitoring.

    August 12, 2015
  • The National Institute of Standards and Technology produces prodigious amounts of data. Now it wants your help to make that data more accessible. NIST has launched a contest to create and design an app using some of its data sets. Heather Evans is a challenge manager at NIST. She joined the Federal Drive with Tom Temin with more on the contest.

    July 31, 2015
  • The Office of Management and Budget is working on new cybersecurity guidelines for contractors in the wake of two major breaches. Contractors already have five major expectations for their own cyber programs from the National Institute of Standards and Technology. Larry Allen is president of Allen Federal Business Partners and writes the Week Ahead newsletter. He tells In Depth with Francis Rose that your company can't get into the cybersecurity game without perfecting and securing its own network first.

    July 30, 2015
  • People use mobile devices for almost everything nowadays — sometimes even for viewing sensitive information. It's not just the intelligence community that needs to keep its devices protected. Medical providers need a middle ground between security and convenience as well. To that end, the National Cybersecurity Center of Excellence has released a new set of rules to help health care providers keep their mobile devices as secure as possible. Gavin O'Brien is a project manager at NCCoE. He joined Tom Temin on the Federal Drive to review the new guidelines.

    July 29, 2015
  • The breaches of the Office of Personnel Management's networks underscore how vulnerable the government is to hackers. Every federal employee can strengthen or weaken the government's cybersecurity. Federal News Radio's Emily Kopp asked two experts to share some tips for being safe online during a training conference hosted by Gov Loop. The first voice you'll hear is Kristina Dorville, the Homeland Security Department’s branch chief for cyber education and awareness. We'll also hear from Celia Paulsen, an IT security specialist at the National Institute of Standards and Technology.

    July 23, 2015
  • The Defense Department and the National Institute of Standards and Technology provided a lift to the future of mobile computing in the government. DoD announced it moved its classified mobile capability from a pilot stage…

    June 30, 2015