NIST
Quantum Computing and the Risk to Classical Cryptography
The recent standardization of first three post-quantum cryptography (PQC) encryption and digital signature algorithms by the U.S. National Institute of Standards and Technology (NIST) has officially kicked off the race to PQC ...
ISO 27001 vs NIST: The Differences and How They Overlap
When you consider national and global cybersecurity, a handful of names stand out. Two of the largest are NIST and ISO/IEC. Both of these organizations have issued plenty of rulings and frameworks ...
NIST Releases First Post-Quantum Encryption Algorithms
From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was ...
NIST Releases Post Quantum Cryptography Standards
The National Institute of Standards and Technology (NIST) released its first three post-quantum cryptography (PQC) standards, a world-first designed to meet the threat of powerful quantum computers as well as the increasing ...
AttackIQ’s New NIST CSF Assessment: A Game-Changer for Cybersecurity
The cybersecurity landscape is constantly evolving, with threats becoming increasingly sophisticated. Organizations are under immense pressure to protect their sensitive data and systems from cyberattacks. To address this challenge, many are turning ...
What is NIST Compliance? A Guide to NIST Standards, Framework & Controls
Data protection is a top concern for businesses both large and small, and that’s where NIST comes in. NIST, orRead More The post What is NIST Compliance? A Guide to NIST Standards, ...
How to Achieve Crypto Resilience for a Post-Quantum World
While it's unlikely that quantum computers are currently in the hands of cybercriminals or hostile nation-states, they will be ...
Cyber Trust Mark: The Impacts and Incentives of Early Adoption
The Cyber Trust Mark is a labeling initiative for consumer IoT devices in the United States that builds on work undertaken by the FCC and NIST, establishing data privacy and cybersecurity standards ...
The NIST Finally Hires a Contractor to Manage CVEs
Security experts have been frustrated because no one was managing the Common Vulnerabilities and Exposures security reports. Good news: The NIST has hired a company to manage the backlog. Bad news: The ...
Conducting a CMMC 2.0 Readiness Assessment
The Cybersecurity Maturity Model Certification program gives the Defense Department a mechanism to verify the readiness of defense contractors both large and small to handle controlled unclassified information and federal contract information ...