NIST | GovernmentCIO Media & Research


Increased capacity for critical information requires efficient and secure maintenance of systems.
NIST is standardizing quantum-proof encryption algorithms to help federal agencies protect against quantum-based attacks.
New AI frameworks, blueprints and ethical guidelines are impacting federal agencies.
DevSecOps practices could secure open source technology as new threats emerge.
Federal agencies will need to incorporate post-quantum cryptography into their data security frameworks to avoid potential cybersecurity risks from quantum computers.
The Department of Education builds incident response and recovery plan on resilience and guidance from the National Institute of Standards and Technology.
The State of the Federal Cyber Workforce report outlines areas for improvement and a new action plan.
New policies are incorporating more flexibility to recruit talented employees.
OMB’s new supply chain memo calls on agencies to utilize software that has been built following common cybersecurity practices.
The agency's software chief has a framework for technology's impact on health IT.
Enabling data access, collection and protection can augment manual processes and keep systems secure.
Security threats facing next-generation networks need proactive approaches amid cybersecurity and digital modernization strategies.
Software supply chain risk management and continuous monitoring are key strategies for maintaining a strong cyber posture in the cloud.
Federal cybersecurity leaders are seeking to protect critical assets through supply chain security and new standards.
From buzzword to White House imperative, zero trust can be a confusing but necessary concept for security strategies.
Federal agencies have refined their cybersecurity practices to adapt to both newfound threats and the broad shift to remote work.
Agencies can approach security in hybrid cloud environments, including SaaS and IaaC.
Officials from CISA, GSA and NIST say information sharing will be key to managing security risks in the supply chain.
Continuous monitoring of assets on a cloud server amplify security and privacy.
Leaders discuss execution of cybersecurity is just as important as modernized systems.