In the news
July 10, 2017  |  Inside Cybersecurity

NIST hosts at the National Cybersecurity Center of Excellence in Rockville, MD on Tuesday and Wednesday a workshop on “enhancing resilience of the internet and communications ecosystem,” where discussions about mitigating botnet threats, cyber best practices and standards, and government roles in securing cyberspace will take place.

In the news
June 28, 2017  |  Inside Cybersecurity

The National Institute of Standards and Technology is underscoring the need to develop consensus cybersecurity standards and “best practices” for the emerging Internet of Things, to avoid a patchwork of requirements.

June 27, 2017  |  Donna Dodson

As its name suggests, the internet of things will connect all kinds of things, bringing us a wealth of data about, well, everything that we can use to improve our lives. For example, internet-connected smart parking meters are helping people find available parking spaces, saving time, fuel and probably more than a few relationships. People are using fitness trackers to log their daily activity and achieve their fitness goals, making them healthier and happier. And technologies that promise to make travel safer and more convenient, such as self-driving cars and highway sensors that detect and adapt to real-time road conditions, are quickly moving from concept to reality.

In the news
June 27, 2017  |  PC Magazine

One of the final frontiers of medicine is using technology to solve problems medication and traditional surgery cannot. Implantable medical devices help regulate heart rhythms, steady the tremors of Parkinson's patients, and deliver insulin. But how susceptible are they to getting hacked?

In the news
June 07, 2017  |  Asia Pacific Security Magazine

The NCCoE is working with the public safety and first responder (PSFR) community to develop a Mobile Application Single Sign-On (SSO) solution to assist PSFR personnel in immediately accessing critical public safety data during states of emergency. After publishing a final project description, the NCCoE released a Federal Register notice seeking technology collaborators.

In the news
June 02, 2017  |  Becker's Health IT and CIO Review

The recent Ransomware event has focused attention on the fragile state of information systems across the globe. Unfortunately, it is not because the malicious actors are leveraging advanced technology or unique exploits. It is caused by a breakdown in the day-to-day maintenance of the information technology resources which are so inextricably linked to our everyday lives. No individual industry is more affected by the form of malicious software (“Malware”) known as Ransomware than the healthcare industry. 

In the news
June 02, 2017  |  Consumer Affairs

With consumers increasingly using their mobile devices for all electronic transactions, including banking, there is growing concern about the security of mobile devices. The National Cybersecurity Center of Excellence, part of the Commerce Department, says ensuring the security of the information that a mobile device accesses, stores, and processes is a difficult cybersecurity challenge with no easy solution.

In the news
June 02, 2017  |  ExecutiveGov

The National Institute of Standards and Technology‘s National Cybersecurity Center of Excellence has begun to seek public comments on a draft project that seeks to develop a publication to provide recommendations to protect internet traffic routing functions from cyber threats.

In the news
May 31, 2017  |  Government Security News

The National Cybersecurity Center of Excellence (NCCoE) announced the release of a new draft project description: Secure Inter-Domain Routing: Route Hijacks. We are seeking your feedback on this draft to help refine the challenge scope. Comments are due Wednesday, June 29, 2017.

In the news
May 31, 2017  |  NextGov

The government’s cybersecurity standards agency is seeking public feedback on a slate of recommendations for better ensuring the security of internet traffic routing. The planned “cybersecurity practice guide” will detail best practices for protecting internet traffic from various cyberattacks that rely on rerouting web traffic to points where it can be hijacked or surveilled.