News

Blog
June 27, 2017  |  Donna Dodson

As its name suggests, the internet of things will connect all kinds of things, bringing us a wealth of data about, well, everything that we can use to improve our lives. For example, internet-connected smart parking meters are helping people find available parking spaces, saving time, fuel and probably more than a few relationships. People are using fitness trackers to log their daily activity and achieve their fitness goals, making them healthier and happier. And technologies that promise to make travel safer and more convenient, such as self-driving cars and highway sensors that detect and adapt to real-time road conditions, are quickly moving from concept to reality.

In the news
June 07, 2017  |  Asia Pacific Security Magazine

The NCCoE is working with the public safety and first responder (PSFR) community to develop a Mobile Application Single Sign-On (SSO) solution to assist PSFR personnel in immediately accessing critical public safety data during states of emergency. After publishing a final project description, the NCCoE released a Federal Register notice seeking technology collaborators.

In the news
June 02, 2017  |  Consumer Affairs

With consumers increasingly using their mobile devices for all electronic transactions, including banking, there is growing concern about the security of mobile devices. The National Cybersecurity Center of Excellence, part of the Commerce Department, says ensuring the security of the information that a mobile device accesses, stores, and processes is a difficult cybersecurity challenge with no easy solution.

In the news
June 02, 2017  |  ExecutiveGov

The National Institute of Standards and Technology‘s National Cybersecurity Center of Excellence has begun to seek public comments on a draft project that seeks to develop a publication to provide recommendations to protect internet traffic routing functions from cyber threats.

In the news
June 02, 2017  |  Becker's Health IT and CIO Review

The recent Ransomware event has focused attention on the fragile state of information systems across the globe. Unfortunately, it is not because the malicious actors are leveraging advanced technology or unique exploits. It is caused by a breakdown in the day-to-day maintenance of the information technology resources which are so inextricably linked to our everyday lives. No individual industry is more affected by the form of malicious software (“Malware”) known as Ransomware than the healthcare industry. 

In the news
May 31, 2017  |  NextGov

The government’s cybersecurity standards agency is seeking public feedback on a slate of recommendations for better ensuring the security of internet traffic routing. The planned “cybersecurity practice guide” will detail best practices for protecting internet traffic from various cyberattacks that rely on rerouting web traffic to points where it can be hijacked or surveilled.

In the news
May 31, 2017  |  Government Security News

The National Cybersecurity Center of Excellence (NCCoE) announced the release of a new draft project description: Secure Inter-Domain Routing: Route Hijacks. We are seeking your feedback on this draft to help refine the challenge scope. Comments are due Wednesday, June 29, 2017.

Blog
May 24, 2017  |  William Fisher

Motorola Solutions, Nok Nok Labs, Ping Identity, StrongAuth, and Yubico have joined the National Cybersecurity Center of Excellence (NCCoE) as technology collaborators in the Mobile Application Single Sign-On (SSO) project. As part of this collaboration, NIST will compose and release a publicly available Cybersecurity Practice Guide (Special Publication 1800 series) that will document the reference design and help public safety and first responder (PSFR) organizations implement multifactor authentication and mobile application SSO in their own environments.

In the news
May 19, 2017  |  Lexology

Earlier this month, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) published a set of best practices and guidance on how to protect against threats to wireless infusion pumps. The guide, which is primarily intended as a “how-to” for professionals implementing security solutions, was developed following collaboration with healthcare stakeholders, technology vendors, and cybersecurity vendors.

In the news
May 19, 2017  |  HealthITSecurity.

A recent Department of Homeland Security (DHS) report on improving the federal government’s approach to mobile device security could also have potential impact on healthcare’s mobile approach. The report is based off of a study conducted in coordination with NIST and its National Cybersecurity Center of Excellence (NCCoE).