CINXE.COM
Updates | CSRC
<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head> <meta charset="utf-8" /> <title>Updates | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8" /> <meta http-equiv="content-style-type" content="text/css" /> <meta http-equiv="content-script-type" content="text/javascript" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml" /> <meta name="theme-color" content="#000000" /> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA" /> <meta name="description" content="News and Updates from NIST's Computer Security and Applied Cybersecurity Divisions." /> <link rel="apple-touch-icon" sizes="180x180" href="/images/icons/apple-touch-icon.png" /> <link rel="icon" type="image/png" href="/images/icons/favicon-32x32.png" sizes="32x32" /> <link rel="icon" type="image/png" href="/images/icons/favicon-16x16.png" sizes="16x16" /> <link rel="manifest" href="/images/icons/manifest.json" /> <link rel="mask-icon" href="/images/icons/safari-pinned-tab.svg" color="#000000" /> <link href="/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon" /> <link href="/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon" /> <link href="/dist/app.css" rel="stylesheet" /> <!-- Highlight.js --> <link href="/dist/highlight-js/github.css" rel="stylesheet" /> <!-- USWDS Top --> <link href="/dist/uswds/css/uswds.css" type="text/css" rel="stylesheet" /> <script type="text/javascript" src="/dist/uswds/js/uswds-init.min.js"></script> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&subagency=csrc&pua=UA-66610693-15&yt=true&exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjackCss"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjackCss"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script> 聽聽window.dataLayer = window.dataLayer || []; 聽聽function gtag(){dataLayer.push(arguments);} 聽聽gtag('js', new Date()); 聽聽gtag('config', 'G-TSQ0PLGJZP'); </script> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer','GTM-MZQC4NCJ');</script> <!-- End Google Tag Manager --> </head> <body> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-MZQC4NCJ" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://csrc.nist.gov">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official website of the United States government"> <div class="usa-accordion"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <div class="usa-banner__inner"> <div class="grid-col-auto"> <img aria-hidden="true" class="usa-banner__header-flag" src="/dist/uswds/img/us_flag_small.png" alt=""/> </div> <div class="grid-col-fill tablet:grid-col-auto" aria-hidden="true"> <p class="usa-banner__header-text"> An official website of the United States government </p> <p class="usa-banner__header-action">Here鈥檚 how you know</p> </div> <button type="button" class="usa-accordion__button usa-banner__button" aria-expanded="false" aria-controls="gov-banner-default"> <span class="usa-banner__button-text">Here鈥檚 how you know</span> </button> </div> </header> <div class="usa-banner__content usa-accordion__content" id="gov-banner-default"> <div class="grid-row grid-gap-lg"> <div class="usa-banner__guidance tablet:grid-col-6"> <img class="usa-banner__icon usa-media-block__img" src="/dist/uswds/img/icon-dot-gov.svg" role="img" alt="" aria-hidden="true"/> <div class="usa-media-block__body"> <p> <strong>Official websites use .gov</strong><br/>A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> <div class="usa-banner__guidance tablet:grid-col-6"> <img class="usa-banner__icon usa-media-block__img" src="/dist/uswds/img/icon-https.svg" role="img" alt="" aria-hidden="true"/> <div class="usa-media-block__body"> <p> <strong>Secure .gov websites use HTTPS</strong><br/>A <strong>lock</strong> ( <span class="icon-lock"> <svg xmlns="http://www.w3.org/2000/svg" width="52" height="64" viewBox="0 0 52 64" class="usa-banner__lock-image" role="img" aria-labelledby="banner-lock-description-default" focusable="false"> <title id="banner-lock-title-default">Lock</title> <desc id="banner-lock-description-default">Locked padlock icon</desc> <path fill="#000000" fill-rule="evenodd" d="M26 0c10.493 0 19 8.507 19 19v9h3a4 4 0 0 1 4 4v28a4 4 0 0 1-4 4H4a4 4 0 0 1-4-4V32a4 4 0 0 1 4-4h3v-9C7 8.507 15.507 0 26 0zm0 8c-5.979 0-10.843 4.77-10.996 10.712L15 19v9h22v-9c0-6.075-4.925-11-11-11z"/> </svg> </span >) or <strong>https://</strong> means you鈥檝e safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://www.nist.gov" target="_blank" id="navbar-brand-image"> <img src="/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC" /> <input type="hidden" name="ipp" value="25" /> <input type="hidden" name="sortBy" value="relevance" /> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics" /> <input type="hidden" name="topicsMatch" value="ANY" /> <input type="hidden" name="status" value="Final,Draft" /> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC" /> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/projects">Projects</a></li> <li> <a href="/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/publications/final-pubs">Final Pubs</a></p> <p><a href="/publications/fips">FIPS <small>(standards)</small></a></p> </div> <div class="col-lg-4"> <p><a href="/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/publications/ir">IR <small>(interagency/internal reports)</small></a></p> <p><a href="/publications/cswp">CSWP <small>(cybersecurity white papers)</small></a></p> <p><a href="/publications/itl-bulletin">ITL Bulletins</a></p> </div> <div class="col-lg-4"> <p><a href="/publications/project-description">Project Descriptions</a></p> <p><a href="/publications/journal-article">Journal Articles</a></p> <p><a href="/publications/conference-paper">Conference Papers</a></p> <p><a href="/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/Topics/Security-and-Privacy">Security & Privacy</a></p> <p><a href="/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/Topics/Technologies">Technologies</a></p> <p><a href="/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/Topics/Laws-and-Regulations">Laws & Regulations</a></p> <p><a href="/Topics/Activities-and-Products">Activities & Products</a></p> </div> </div> </div> </li> <li><a href="/news">News & Updates</a></li> <li><a href="/events">Events</a></li> <li><a href="/glossary">Glossary</a></li> <li> <a href="/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/Groups/Computer-Security-Division">Computer Security Division</a></strong><br /> <ul> <li><a href="/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br /> <ul> <li><a href="/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/"><img id="img-logo-csrc-lg" src="/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/"><img id="img-logo-csrc-sm" src="/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="home-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <ul class="side-nav" id="left-side-navigation"> <li><a href="/projects">Projects</a></li> <li> <a href="/publications"> Publications <span class="expander fa fa-plus" id="side-menu-pubs-expander" data-expander-name="publicationsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publicationsSide" id="side-menu-pubs-expanded"> <ul> <li><a href="/publications/drafts-open-for-comment">Drafts for Public Comment</a></li> <li><a href="/publications/draft-pubs">All Public Drafts</a></li> <li><a href="/publications/sp">NIST Special Publications (SPs)</a></li> <li><a href="/publications/fips">FIPS</a></li> <li><a href="/publications/nistir">NIST interagency/internal reports (NISTIRs)</a></li> <li><a href="/publications/itl-bulletin">ITL Bulletins</a></li> <li><a href="/publications/white-paper">White Papers</a></li> <li><a href="/publications/journal-article">Journal Articles</a></li> <li><a href="/publications/conference-paper">Conference Papers</a></li> <li><a href="/publications/book">Books</a></li> </ul> </div> </li> <li> <a href="/topics"> Topics <span class="expander fa fa-plus" id="side-menu-topics-expander" data-expander-name="topicsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topicsSide" id="side-menu-topics-expanded"> <ul> <li><a href="/Topics/Security-and-Privacy">Security & Privacy</a></li> <li><a href="/Topics/Applications">Applications</a></li> <li><a href="/Topics/Technologies">Technologies</a></li> <li><a href="/Topics/Sectors">Sectors</a></li> <li><a href="/Topics/Laws-and-Regulations">Laws & Regulations</a></li> <li><a href="/Topics/Activities-and-Products">Activities & Products</a></li> </ul> </div> </li> <li><a href="/news">News & Updates</a></li> <li><a href="/events">Events</a></li> <li><a href="/glossary">Glossary</a></li> <li> <a href="/about"> About CSRC <span class="expander fa fa-plus" id="side-menu-about-expander" data-expander-name="aboutSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="aboutSide" id="side-menu-about-expanded"> <strong><a href="/Groups/Computer-Security-Division">Computer Security Division</a></strong><br /> <ul> <li><a href="/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> <strong><a href="/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br /> <ul> <li><a href="/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> <strong><a href="/contact-us">Contact Us</a></strong> </div> </li> </ul> <form action="/news" class="bs-callout bs-callout-success csrc-search-form" data-csrc-form="true" data-default-query="sortBy-lg=newsdatetime+desc" data-form-ignore-default="sortBy" data-form-name="news-search-form" method="get"> <div class="form-group"> <label for="news-search-keywords">Search</label> <input Name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="news-search-keywords" name="Form.Keywords" type="text" value="" /> <em class="text-muted">Search Title, Description, Federal Register Number</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select Name="sortBy-lg" class="form-control form-control-full" id="sortBy-lg" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="newsdatetime desc">Date (newest first)</option> <option value="newsdatetime asc">Date (oldest first)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group form-inline"> <label for="news-search-ipp" class="form-control-half">Items Per Page</label> <select Name="ipp-lg" class="form-control" id="news-search-ipp" name="Form.ItemsPerPage"><option selected="selected" value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input Name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value="" /> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input Name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value="" /> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <div class="form-inline" id="news-search-frn"> <label style="font-weight: normal; font-size: 1rem;"> <input Name="frn-lg" class="form-control" data-val="true" data-val-required="The IsFrnOnly field is required." id="frn-lg" name="Form.IsFrnOnly" type="checkbox" value="true" /><input name="Form.IsFrnOnly" type="hidden" value="false" /> Show only Federal Register Notices </label> </div> </div> <div class="form-group"> <label for="news-search-topics-lg">Topics</label> <input Name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value="" /> <div class="form-control topics-selection" id="news-search-topics-lg" contenteditable="true" data-drop-target="news-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true"> </div> <div class="topics-selection-dropdown desktop" id="news-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-27484-27665" data-expander-for="/topics/security-and-privacy/identity-and-access-management/authentication"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="36230" data-topic-text="passwords">passwords</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36185" data-topic-text="phishing">phishing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="37080" data-topic-text="ransomware">ransomware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36763" data-topic-text="semiconductors">semiconductors</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36202" data-topic-text="Executive Order 14110">Executive Order 14110</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35985" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36366" data-topic-text="quick-start guides">quick-start guides</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstdl-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input Name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY" /></label> <label class="radio-label">Match ALL: <input Name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL" /></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="submit-btn-lg" name="submit-btn-lg" data-form-button="submit" class="btn">Search</button> <button type="reset" id="reset-btn-lg" name="reset-btn-lg" data-form-button="reset" class="btn">Reset</button> </div> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h1>News & Updates</h1> <form action="/news" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-sm=newsdatetime+desc" data-form-ignore-default="sortBy" data-form-name="news-search-form-mobile" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input Name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value="" /> <em class="text-muted">Search Title, Description, Federal Register Number</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select Name="sortBy-sm" class="form-control form-control-full" id="sortBy-sm" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="newsdatetime desc">Date (newest first)</option> <option value="newsdatetime asc">Date (oldest first)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select Name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option selected="selected" value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input Name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="news-search-date-to" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value="" /> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input Name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value="" /> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <div class="form-inline" id="frn-sm-container"> <label style="font-weight: normal; font-size: 1rem;"> <input Name="frn-sm" class="form-control" data-val="true" data-val-required="The IsFrnOnly field is required." id="frn-sm" name="Form.IsFrnOnly" type="checkbox" value="true" /><input name="Form.IsFrnOnly" type="hidden" value="false" /> Show only Federal Register Notices </label> </div> </div> <div class="form-group"> <label for="news-search-topics-sm">Topics</label> <input Name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value="" /> <div class="form-control topics-selection" id="news-search-topics-sm" contenteditable="true" data-drop-target="news-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true"> </div> <div class="topics-selection-dropdown desktop" id="news-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-27484-27665" data-expander-for="/topics/security-and-privacy/identity-and-access-management/authentication"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="36230" data-topic-text="passwords">passwords</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36185" data-topic-text="phishing">phishing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="37080" data-topic-text="ransomware">ransomware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36763" data-topic-text="semiconductors">semiconductors</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36202" data-topic-text="Executive Order 14110">Executive Order 14110</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35985" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36366" data-topic-text="quick-start guides">quick-start guides</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-nstds-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input Name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY" /></label> <label class="radio-label">Match ALL: <input Name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL" /></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="submit-btn-sm" name="submit-btn-sm" data-form-button="submit" class="btn">Search</button> <button type="reset" id="reset-btn-sm" name="reset-btn-sm" data-form-button="reset" class="btn">Reset</button> </div> </form> <div id="search-criteria-container" data-target-form="news-search-form"></div> <div id="results-container"> <div class="row top-pagination-area"> <div class="col-md-6 col-sm-12"> <span id='showing-results-text' data-total-pages='43' data-first-record='1' data-last-record='25' data-current-page='1' data-items-per-page='25' data-total-results='1055'>Showing <strong id='showing-results-first'>1</strong> through <strong id='showing-results-last'>25</strong> of <strong id='showing-results-total'>1055</strong> matching records.</span> </div> <div class="col-md-6 col-sm-12"> <span class="pull-right hidden-sm hidden-xs hidden-xxs"> <span class='pagination-links' id='top-pagination-container' data-total-pages='43' data-min-page='1' data-max-page='10' data-current-page='1' data-show-first='False' data-show-last='True'><strong aria-label="Page 1" id="top-page-1">1</strong> | <a href="/news?page=2" aria-label="Page 2" id="top-page-2">2</a> | <a href="/news?page=3" aria-label="Page 3" id="top-page-3">3</a> | <a href="/news?page=4" aria-label="Page 4" id="top-page-4">4</a> | <a href="/news?page=5" aria-label="Page 5" id="top-page-5">5</a> | <a href="/news?page=6" aria-label="Page 6" id="top-page-6">6</a> | <a href="/news?page=7" aria-label="Page 7" id="top-page-7">7</a> | <a href="/news?page=8" aria-label="Page 8" id="top-page-8">8</a> | <a href="/news?page=9" aria-label="Page 9" id="top-page-9">9</a> | <a href="/news?page=10" aria-label="Page 10" id="top-page-10">10</a> <a href="/news?page=2" aria-label="Next Page" id="top-page-next">></a> <a href="/news?page=43" aria-label="Last Page" id="top-page-last" data-last-page-number="43">>></a></span> </span> <p class="text-center hidden-md hidden-lg"> <span class='pagination-links' id='mobile-top-pagination-container' data-total-pages='43' data-min-page='1' data-max-page='10' data-current-page='1' data-show-first='False' data-show-last='True'><strong aria-label="Page 1" id="mobile-top-page-1">1</strong> | <a href="/news?page=2" aria-label="Page 2" id="mobile-top-page-2">2</a> | <a href="/news?page=3" aria-label="Page 3" id="mobile-top-page-3">3</a> | <a href="/news?page=4" aria-label="Page 4" id="mobile-top-page-4">4</a> | <a href="/news?page=5" aria-label="Page 5" id="mobile-top-page-5">5</a> | <a href="/news?page=6" aria-label="Page 6" id="mobile-top-page-6">6</a> | <a href="/news?page=7" aria-label="Page 7" id="mobile-top-page-7">7</a> | <a href="/news?page=8" aria-label="Page 8" id="mobile-top-page-8">8</a> | <a href="/news?page=9" aria-label="Page 9" id="mobile-top-page-9">9</a> | <a href="/news?page=10" aria-label="Page 10" id="mobile-top-page-10">10</a> <a href="/news?page=2" aria-label="Next Page" id="mobile-top-page-next">></a> <a href="/news?page=43" aria-label="Last Page" id="mobile-top-page-last" data-last-page-number="43">>></a></span> </p> </div> </div> <div class="search-results-list" id="search-results-list" data-total-records="1055" data-page="1" data-first-record="1" data-last-record="25" data-ipp="25"> <div class="news-list-item" id="result-1"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/nist-releases-nist-ir-8356" id="short-title-1">NIST Releases NIST IR 8356</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-1">February 14, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-1">NIST has published Internal Report (IR) 8356, <em>Security and Trust Considerations for Digital Twin Technology</em></p> </div> </div> </div> <div class="news-list-item" id="result-2"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/comment-on-the-2nd-draft-of-sp-800-38g-rev-1" id="short-title-2">Comment on the 2nd Draft of SP 800-38G Rev. 1</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-2">February 3, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-2">NIST has released a second public draft (2PD) of Special Publication (SP) 800-38Gr1 (Revision 1), Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption, for public comment. The public comment period for this draft is open through April 4, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-3"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/nist-publishes-ir-8539" id="short-title-3">NIST Publishes IR 8539</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-3">January 31, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-3">NIST Internal Report (IR) 8539, Security Property Verification by Transition Model, is now available.</p> </div> </div> </div> <div class="news-list-item" id="result-4"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/draft-cswp-38d-is-available-for-public-comment" id="short-title-4">Draft CSWP 38D is Available for Public Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-4">January 30, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-4">NIST Initial Public Draft CSWP 36D, No SUPI-Based Paging: Applying 5G Cybersecurity and Privacy Capabilities; is available for public comment. The comment period is open through February 28, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-5"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/proposal-to-revise-sp-800-38b-and-sp-800-38c" id="short-title-5">Proposal to Revise SP 800-38B and SP 800-38C</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-5">January 29, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-5">NIST's Crypto Publication Review Board is proposing to update Special Publications 800-38B, "The CMAC Mode for Authentication," and 800-38C, "The CCM Mode for Authentication and Confidentiality." Submit public comments through Friday, February 28, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-6"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/draft-ransomware-risk-management-csf-20-profile" id="short-title-6">Draft Ransomware Risk Management CSF 2.0 Profile</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-6">January 13, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-6">The NCCoE has posted an intial public draft of NIST Internal Report 8374r1, "Ransomware Risk Management: A Cybersecurity Framework 2.0 Community Profile," for comment. The public comment period is open through March 14, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-7"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/draft-sp-800-227-is-available-for-comment" id="short-title-7">Draft SP 800-227 is Available for Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-7">January 7, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-7">The initial public draft of NIST Special Publication (SP) 800-227, Recommendations for Key-Encapsulation Mechanisms, is now available for public comment. The public comment period is open through March 7, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-8"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/pre-draft-call-for-comments-on-gcm-and-gmac" id="short-title-8">Pre-Draft Call for Comments on GCM and GMAC</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-8">January 6, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-8">NIST requests public comments on whether to pursue one or both approaches (GCM and GMAC).The public comment period closes on March 14, 2025. </p> </div> </div> </div> <div class="news-list-item" id="result-9"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2025/nist-releases-public-draft-of-sp-800-189-rev-1" id="short-title-9">NIST Releases Public Draft of SP 800-189 Rev 1</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-9">January 3, 2025</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-9">NIST has released the initial public draft (IPD) of Revision 1 of NIST Special Publication (SP) 800-189, Border Gateway Protocol Security and Resilience. The public comment period ends February 25, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-10"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/nist-proposes-to-standardize-wider-variant-of-aes" id="short-title-10">NIST Proposes to Standardize a Wider Variant of AES</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-10">December 24, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-10">NIST indicated its interest in vetting another Rijndael variant for approval: Rijndael with 256-bit blocks (i.e., Rijndael-256) with a single key size of 256-bits. NIST plans to develop a draft standard for Rijndael-256 over the next year and requests public comments on this plan by June 25, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-11"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/nist-publishes-nist-ir-8498" id="short-title-11">NIST Publishes NIST IR 8498</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-11">December 20, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-11">This report (NIST IR 8498) provides practical cybersecurity guidance for small-scale solar inverter implementations that are typically used in homes and small businesses.</p> </div> </div> </div> <div class="news-list-item" id="result-12"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/NCCoE-Releases-2-Draft-Documents-for-Comments" id="short-title-12">Comment on Two NIST Genomic Data Cybersecurity and Privacy Drafts</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-12">December 17, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-12">The second public draft of NIST Internal Report (IR) 8467, "Genomic Data Cybersecurity and Privacy Frameworks Community Profile" and the initial public draft of NIST Cybersecurity White Paper (CSWP) 35, "Cybersecurity Threat Modeling the Genomic Data Sequencing Workflow"<em> </em>are open for public comment through January 30, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-13"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/public-comments-requested-on-the-sp-800-56-subseri" id="short-title-13">Public Comments Requested on the SP 800-56 Subseries</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-13">December 11, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-13">NIST's Crypto Publication Review Board has requested initial public comments on NIST Special Publications (SP) 800-56A, 800-56B, and 800-56C, in the "Recommendations for Key Establishment" subseries. The comment period is open through January 31, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-14"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/nist-guidance-on-implementing-a-zta" id="short-title-14">NIST Guidance on Implementing a ZTA</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-14">December 5, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-14">The NIST National Cybersecurity Center of Excellence (NCCoE) has released the draft of the practice guide, Implementing a Zero Trust Architecture (NIST SP 1800-35), for public comment. The public comment period is open through January 31, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-15"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/nist-releases-volumes-1-and-2-of-sp-800-55" id="short-title-15">NIST Releases Volumes 1 and 2 of SP 800-55</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-15">December 4, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-15">NIST has published the final version of Special Publication (SP) 800-55, Measurement Guide for Information Security, which comprises: SP 800-55 Volume 1 and 2.</p> </div> </div> </div> <div class="news-list-item" id="result-16"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/report-on-2024-accordion-cipher-mode-workshop" id="short-title-16">Report on 2024 Accordion Cipher Mode Workshop</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-16">November 21, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-16">NIST releases NIST IR 8537, NIST Workshop on the Requirements for an Accordion Cipher Mode 2024: Workshop Report.</p> </div> </div> </div> <div class="news-list-item" id="result-17"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/nist-privacy-workforce-taxonomy-initial-draft" id="short-title-17">NIST Privacy Workforce Taxonomy Initial Draft</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-17">November 21, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-17">The NIST Privacy Framework Team is pleased to announce the release of the NIST Privacy Workforce Taxonomy, Initial Public Draft (IPD)! We welcome stakeholder feedback on the Workforce Taxonomy IPD by January 17, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-18"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/public-comments-requested-on-sp-800-102" id="short-title-18">Public Comments Requested on SP 800-102</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-18">November 15, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-18">NIST's Crypto Publication Review Board has requested initial public comments on NIST Special Publication 800-102, Recommendation for Digital Signature Timeliness. The comment period is open through January 14, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-19"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/draft-sp-800-157r1-and-sp-800-217-public-comment" id="short-title-19">Draft SP 800-157R1 and SP 800-217 Public Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-19">November 14, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-19">The final public drafts (fpd) of NIST Special Publication (SP) 800-157 Revision 1, Guidelines for Derived Personal Identity Verification (PIV) Credentials, and SP 800-217,<em> </em>Guidelines for Personal Identity Verification (PIV) Federation, are now available for public review and comment. The public comment period for both final drafts are open through January 10, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-20"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/draft-sp-800-172r3-available-for-public-comment" id="short-title-20">Draft SP 800-172R3 Available for Public Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-20">November 13, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-20">The initial public draft (ipd) of NIST Special Publication (SP) 800-172 Revision 3, Enhanced Security Requirements for Protecting Controlled Unclassified Information (CUI), is available for comment. The public comment period is open through January 17, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-21"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/nist-releases-nist-ir-8517" id="short-title-21">NIST Releases NIST IR 8517</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-21">November 13, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-21">NIST Internal Report (IR) 8517, Hardware Security Failure Scenarios: Potential Weaknesses in Hardware Design, has now been finalized.</p> </div> </div> </div> <div class="news-list-item" id="result-22"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/draft-nist-ir-8547-is-available-for-comment" id="short-title-22">Draft NIST IR 8547 is Available for Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-22">November 12, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-22">The initial public draft of NIST Internal Report (IR) 8547, Transition to Post-Quantum Cryptography Standards, is now available for public comment. The public comment period is open through January 10, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-23"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/nist-invites-public-comments-on-sp-800-232" id="short-title-23">NIST Invites Public Comments on SP 800-232</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-23">November 8, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-23">The initial public draft of Special Publication (SP) 800-232, Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions<em> </em>is available for public comment through February 7, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-24"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/cswp-34-is-available-for-public-comment" id="short-title-24">CSWP 34 is Available for Public Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-24">November 7, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-24">The NCCoE has released for public comment the draft of NIST Cybersecurity White Paper (CSWP) 34, Mitigating Cybersecurity and Privacy Risks in Telehealth Smart Home Integration. The comment period for the draft is now open through January 21, 2025.</p> </div> </div> </div> <div class="news-list-item" id="result-25"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/News/2024/cswp-36c-is-available-for-public-comment" id="short-title-25">CSWP 36C is Available for Public Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-25">November 7, 2024</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-25">Draft CSWP 36C, Reallocation of Temporary Identities - Applying 5G Cybersecurity & Privacy Capabilities White Paper Series for Public Comment. The public comment period is open through December 6, 2024.</p> </div> </div> </div> </div> <div class="row bottom-pagination-area"> <p class="text-center"> <span class='pagination-links' id='bottom-pagination-container' data-total-pages='43' data-min-page='1' data-max-page='10' data-current-page='1' data-show-first='False' data-show-last='True'><strong aria-label="Page 1" id="bottom-page-1">1</strong> <a href="/news?page=2" aria-label="Page 2" id="bottom-page-2">2</a> <a href="/news?page=3" aria-label="Page 3" id="bottom-page-3">3</a> <a href="/news?page=4" aria-label="Page 4" id="bottom-page-4">4</a> <a href="/news?page=5" aria-label="Page 5" id="bottom-page-5">5</a> <a href="/news?page=6" aria-label="Page 6" id="bottom-page-6">6</a> <a href="/news?page=7" aria-label="Page 7" id="bottom-page-7">7</a> <a href="/news?page=8" aria-label="Page 8" id="bottom-page-8">8</a> <a href="/news?page=9" aria-label="Page 9" id="bottom-page-9">9</a> <a href="/news?page=10" aria-label="Page 10" id="bottom-page-10">10</a> <a href="/news?page=2" aria-label="Next Page" id="bottom-page-next">next ></a> <a href="/news?page=43" aria-label="Last Page" id="bottom-page-last" data-last-page-number="43">last >></a></span> </p> </div> <p id="relevanceInfo">* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.</p> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://www.nist.gov" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo" /> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://x.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa-brands fa-x-twitter fa-fw"><span class="element-invisible">X</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-primary" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://www.nist.gov" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo" /> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://www.nist.gov/about-nist/visit" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://www.science.gov/">Science.gov</a></li> <li><a href="https://www.usa.gov/">USA.gov</a></li> <li><a href="https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/dist/app.bundle.js"></script> <!-- USWDS Bottom --> <script type="text/javascript" src="/dist/uswds/js/uswds.min.js"></script> </body> </html>