The US National Institute of Standards and Technology (NIST) has selected the Ascon cryptographic algorithms to be its lightweight cryptographic standard. Lightweight cryptography algorithms need to be powerful enough to protect small Internet of Things (IoT) and other lightweight devices with limited computational resources. Note It is a very important move by NIST to recognize …
NIST
The US National Institute of Standards and technology (NIXTY) has released the first version of its risk management framework for artificial intelligence (AI). The guidance will be voluntary. Artificial Intelligence Risk Management Framework (AI RMF 1.0) has been created to be useful to organizations of all sizes and in all sectors. NIST will accept comments …
Updated on 2022-12-19 Owing to the evolving security standards, NIST has set a timeline to remove the support for the SHA-1 algorithm from all hardware and software devices. The agency recommends switching to SHA-2 or SHA-3 for securing electronic information. Read more: NIST Transitioning Away from SHA-1 for All Applications Updated on 2022-12-16: NIST retires …
Starting next month, US federal agencies will be required to implement Internet of Things (IoT) cybersecurity guidelines developed by the National Institute of Standards and Technology (NIST). The IoT Cybersecurity Act of 2020 directed NIST to create a series of documents to address the needs of federal agencies seeking to deploy IoT devices within their …
Question/Problem Description Is there an easy-to-use tool that I can use the NIST Cyber Security Framework (CSF) matrix and calculate a score, to know cybersecurity position? Solution #1 One tool that I am recommended is the CSET self assessment tool. CSET is a desktop software tool that guides asset owners and operators through a step-by-step …
The Health Sector Coordinating Council Cybersecurity Working Group has asked the US National Institute of Standards and Technology (NIST) to provide guidance for small and lesser-sourced healthcare organizations. The request comes in response to NIST’s request for comment on SP 800-66r2 initial public draft; it asks NIST to “create an entirely separate document specifically for …