News

President Donald J. Trump has returned to office with the renewed revelations that Chinese government-affiliated hackers continue to outmatch America’s critical infrastructure cyber defenders through ...
This paper provides a high-level comparison between the National Institute of Standards and Technology's (NIST) Cyber Security Framework and the ISO 27001 Information Security Standard. Pros, cons and ...
One chief information security officer shares her experience of marshalling what she learned at the FBI for business security ...
This study aims to construct a distributed network-based medical information sharing security framework to address the current security challenges of medical information sharing. Analyzing existing ...
"This executive order itself doesn’t impose any particular new requirements, but includes deletions and updates to prior ...
I recently published a piece discussing three artificial intelligence (AI) hearings on Capitol Hill where I testified and ...
The California Report on Frontier AI Policy's acknowledgment of an “evidence dilemma” (the challenge of governing systems without a large body of scientific evidence), however, captures ...
Zero Trust Implementation Options The NIST guidance offers 19 example implementations of ZTAs built using commercial, off-the-shelf technologies. These were developed through a project at the NIST ...
Developed through a project at the NIST National Cybersecurity Center of Excellence (NCCoE), the publication offers 19 example implementations of ZTAs built using commercial, off-the-shelf ...
The Institute said although NIST Special Publication (SP) 1800-35 provides the names of the commercial technologies used in the examples, the guide does not specifically endorse any particular product ...