SP 800-56C Rev. 2, Key-Derivation Methods in Key-Establishment Schemes | CSRC
https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/final
https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/final
CSRC | NIST
NIST Special Publication (SP) 800-56C Rev. 2, Recommendation for Key-Derivation Methods in Key-Establishment Schemes
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in NIST Special Publications 800-56A or 800-56B.
SP 800-211, 2019 NIST/ITL Cybersecurity Program Annual Report | CSRC
https://csrc.nist.gov/publications/detail/sp/800-211/final
https://csrc.nist.gov/publications/detail/sp/800-211/final
CSRC | NIST
NIST Special Publication (SP) 800-211, 2019 NIST/ITL Cybersecurity Program Annual Report
During Fiscal Year 2019 (FY 2019), from October 1, 2018 through September 30, 2019, the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy Program successfully responded to numerous challenges and opportunities in security and privacy.…
NISTIR 8272, Impact Analysis Tool for Interdependent Cyber Supply Chain Risks | CSRC
https://csrc.nist.gov/publications/detail/nistir/8272/final
https://csrc.nist.gov/publications/detail/nistir/8272/final
CSRC | NIST
NIST Internal or Interagency Report (NISTIR) 8272, Impact Analysis Tool for Interdependent Cyber Supply Chain Risks
As awareness of cybersecurity supply chain risks grows among federal agencies, there is a greater need for tools that evaluate the impacts of a supply chain-related cyber event. This can be a diffi-cult activity, especially for those organizations with complex…
NISTIR 8006, NIST Cloud Computing Forensic Science Challenges | CSRC
https://csrc.nist.gov/publications/detail/nistir/8006/final
https://csrc.nist.gov/publications/detail/nistir/8006/final
CSRC | NIST
NIST Internal or Interagency Report (NISTIR) 8006, NIST Cloud Computing Forensic Science Challenges
This document summarizes the research performed by the members of the NIST Cloud Computing Forensic Science Working Group, and aggregates, categorizes, and discusses the forensics challenges faced by experts when responding to incidents that have occurred…
Federal cyber agency releases strategy to secure 5G networks | TheHill
https://thehill.com/policy/cybersecurity/513449-federal-cyber-agency-releases-strategy-to-secure-us-5g-networks
https://thehill.com/policy/cybersecurity/513449-federal-cyber-agency-releases-strategy-to-secure-us-5g-networks
TheHill
Federal cyber agency releases strategy to secure 5G networks
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) released a strategy Monday to defend U.S. 5G networks against threats.