Overview of NIST 800-171b: 33 Enhanced Security Requirements to Help Protect DoD Contractors

In early July, NIST released draft versions of two new publications: NIST SP 800-171 Revision 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations NIST SP 800-171B: Protecting Controlled Unclassified Information ...

RSA and NIST Agree ? MFA a Critical Technology to Secure eCommerce

As eCommerce fraud continues to grow in an omnichannel world, how can businesses keep pace with focused fraud attempts? MFA has proven resilient and effective against eCommerce fraud. NIST recently worked with ...
It's Combinatorial, That's Why...

It’s Combinatorial, That’s Why…

via the NIST ITL Newsletter, comes word of a newly released tool that permits comprehensive testing tasks targeting high-risk software. Specifics of the tool - part of the ACTS Test Suite - ...
Credit: M. Bigham/Huntington Ingalls Industries, N. Hanacek/NIST

New NIST IOT Cyebrsecurity Document Published

Credit: M. Bigham/Huntington Ingalls Industries, N. Hanacek/NIST After a single draft in September 2018, the United States Department of Commerce's National Institute of Standards and Technology Computer Security Resource Center published (yesterday, ...

Revisiting the Risk Management Framework in Light of Revision 2

It doesn’t seem very long ago that I was writing about the newly released Risk Management Framework (RMF) and explaining the value of NIST SP 800-37 to our clients. With RMF Revision ...

6 Common Compliance Conundrums to Know About

Cyber security assessment initiatives and frameworks abound in the US government, the most important being the Federal Information Systems Management Act (FISMA), passed in 2002. The law’s broad scope included a mandate ...
Guide Your Business To Safe Harbor in the Cybersecurity Storm

Guide Your Business To Safe Harbor in the Cybersecurity Storm

Although the cybersecurity industry has made great strides recently at reducing the number of digital attacks, bad actors continue to surprise the internet with increasingly sophisticated and clever strategies for breaching online ...

How Does Tripwire Map to the NIST SI-07 control?

| | government, NIST, SI-7
Keeping sensitive data and assets safe is the goal of regulatory cybersecurity frameworks like NIST (National Institute of Standards and Technology). But for government agency security professionals, staying compliant can feel like ...
5 Minute Guide: The NYDFS 500 Cybersecurity Regulations

5 Minute Guide: The NYDFS 500 Cybersecurity Regulations

| | NIST, NYDFS
Cybersecurity is important for companies in all industries, however it's extremely critical for the financial sector. The state government of New York has provided assistance by adding additional security measures for the ...
Third Party Security Risks to Consider and Manage

Third Party Security Risks to Consider and Manage

Guest article by Josh Lefkowitz, CEO of Flashpoint Acceptable business risks must be managed, and none more so than those associated with external vendors who often have intimate access to infrastructure or ...
Loading...