The National Institute of Standards and Technology has been waiting since January for the Office of Information and Regulatory Affairs in OMB to finish its review of the new and expanded privacy controls in SP 800-53, Revision 5.
Savvy organizations have long turned to the National Institute of Standards and Technology for its detailed guidance publications on all facets of cybersecurity, and updates could be on the way.
Replacing the DoD Information Assurance Certification and Accreditation Process (DIACAP) should let owners, operators and defenders of IT systems better manage risks.
Special Publication 800-53, published by the National Institute of Standards and Technology, contains hundreds of security controls organizations can adopt to keep their computers and data safer.
As the network of digital devices expands around the world and becomes even more interconnected, it’s up to the public and private sectors, as well as the academic community and consumers, to do their due diligence in protecting their cyber systems.
The National Institute of Standards and Technology released its final version of Special Publication 800-160. Federal cyber officials say they want the guide to not only strengthen cyber defenses, but start a national dialogue about the growing Internet of Things.
If 800-160 establishes, or re-establishes anything, it’s that security is an engineering discipline.
What is the state of cybersecurity in the federal government? Find out when Strategic Cyber Ventures CTO Ann Barron-DiCamillo joins host John Gilroy on this week’s Federal Tech Talk. September 20, 2016
Ron Ross, a computer security fellow at the National Institute of Standards and Technology, told crowds on Tuesday that faster migration to the cloud could make federal data systems more secure from malicious attacks.
Ron Ross, a fellow at the National Institute of Standards and Technology, and Bob Bigman, a retired CIA chief information security officer and now president of 2BSecure, a consulting firm, made the case for the public and private sectors to move to trustworthy computing more quickly during presentations before the Commission on Enhancing National Cybersecurity.