CINXE.COM
Updates | CSRC
<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/news","20230306050852","https://web.archive.org/","web","https://web-static.archive.org/_static/", "1678079332"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Updates | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <meta name="description" content="News and Updates from NIST's Computer Security and Applied Cybersecurity Divisions."/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20230306050852im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20230306050852im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20230306050852im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20230306050852/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20230306050852im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20230306050852im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20230306050852im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <!-- <link href="/dist/katex/katex.min.css" rel="stylesheet"/> --> <link href="/web/20230306050852cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20230306050852js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&subagency=csrc&pua=UA-66610693-15&yt=true&exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjack"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20230306050852js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script>window.dataLayer = window.dataLayer || []; function gtag() { dataLayer.push(arguments); } gtag('js', new Date()); gtag('config', 'G-TSQ0PLGJZP');</script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20230306050852/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20230306050852im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230306050852im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230306050852im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20230306050852im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20230306050852/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20230306050852im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20230306050852/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <input type="hidden" name="series" value="FIPS,SP,NISTIR,ITL Bulletin,White Paper,Building Block,Use Case,Journal Article,Conference Paper,Book"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20230306050852/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20230306050852/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230306050852/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/fips">FIPS</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/nistir">NISTIR<small>s</small></a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/white-paper">White Papers</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20230306050852/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Security-and-Privacy">Security & Privacy</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws & Regulations</a></p> <p><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Activities-and-Products">Activities & Products</a></p> </div> </div> </div> </li> <li><a href="/web/20230306050852/https://csrc.nist.gov/news">News & Updates</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230306050852/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20230306050852/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20230306050852/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20230306050852/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20230306050852im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20230306050852/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20230306050852im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="home-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <ul class="side-nav" id="left-side-navigation"> <li><a href="/web/20230306050852/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230306050852/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="side-menu-pubs-expander" data-expander-name="publicationsSide" data-expanded="false" id="side-menu-pubs-expander"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publicationsSide" id="side-menu-pubs-expanded"> <ul> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/sp">NIST Special Publications (SPs)</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/fips">FIPS</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/nistir">NIST Internal/Interagency Reports (NISTIRs)</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/white-paper">White Papers</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/publications/book">Books</a></li> </ul> </div> </li> <li> <a href="/web/20230306050852/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="side-menu-topics-expander" data-expander-name="topicsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topicsSide" id="side-menu-topics-expanded"> <ul> <li><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Security-and-Privacy">Security & Privacy</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Applications">Applications</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Technologies">Technologies</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Sectors">Sectors</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws & Regulations</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Topics/Activities-and-Products">Activities & Products</a></li> </ul> </div> </li> <li><a href="/web/20230306050852/https://csrc.nist.gov/news">News & Updates</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230306050852/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="side-menu-about-expander" data-expander-name="aboutSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="aboutSide" id="side-menu-about-expanded"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> <strong><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230306050852/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> <strong><a href="/web/20230306050852/https://csrc.nist.gov/contact-us">Contact Us</a></strong> </div> </li> </ul> <form action="/web/20230306050852/https://csrc.nist.gov/news" class="bs-callout bs-callout-success csrc-search-form" data-csrc-form="true" data-default-query="sortBy-lg=newsdatetime+desc" data-form-ignore-default="sortBy" data-form-name="news-search-form" method="get"> <div class="form-group"> <label for="news-search-keywords">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="news-search-keywords" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search Title, Description, Federal Register Number</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control form-control-full" id="sortBy-lg" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="newsdatetime desc">Date (newest first)</option> <option value="newsdatetime asc">Date (oldest first)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group form-inline"> <label for="news-search-ipp" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="news-search-ipp" name="Form.ItemsPerPage"><option selected="selected" value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <div class="form-inline" id="news-search-frn"> <label style="font-weight: normal; font-size: 1rem;"> <input name="frn-lg" class="form-control" data-val="true" data-val-required="The IsFrnOnly field is required." id="frn-lg" name="Form.IsFrnOnly" type="checkbox" value="true"/><input name="Form.IsFrnOnly" type="hidden" value="false"/> Show only Federal Register Notices </label> </div> </div> <div class="form-group"> <label for="news-search-topics-lg">Topics</label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="news-search-topics-lg" contenteditable="true" data-drop-target="news-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="news-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="37996" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="36440" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="37948" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36439" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36551" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="submit-btn-lg" name="submit-btn-lg" data-form-button="submit" class="btn">Search</button> <button type="reset" id="reset-btn-lg" name="reset-btn-lg" data-form-button="reset" class="btn">Reset</button> </div> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h1>News & Updates</h1> <form action="/web/20230306050852/https://csrc.nist.gov/news" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-sm=newsdatetime+desc" data-form-ignore-default="sortBy" data-form-name="news-search-form-mobile" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search Title, Description, Federal Register Number</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control form-control-full" id="sortBy-sm" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="newsdatetime desc">Date (newest first)</option> <option value="newsdatetime asc">Date (oldest first)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option selected="selected" value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="news-search-date-to" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <div class="form-inline" id="frn-sm-container"> <label style="font-weight: normal; font-size: 1rem;"> <input name="frn-sm" class="form-control" data-val="true" data-val-required="The IsFrnOnly field is required." id="frn-sm" name="Form.IsFrnOnly" type="checkbox" value="true"/><input name="Form.IsFrnOnly" type="hidden" value="false"/> Show only Federal Register Notices </label> </div> </div> <div class="form-group"> <label for="news-search-topics-sm">Topics</label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="news-search-topics-sm" contenteditable="true" data-drop-target="news-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="news-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="37996" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="36440" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="37948" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36439" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36551" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="submit-btn-sm" name="submit-btn-sm" data-form-button="submit" class="btn">Search</button> <button type="reset" id="reset-btn-sm" name="reset-btn-sm" data-form-button="reset" class="btn">Reset</button> </div> </form> <div id="search-criteria-container" data-target-form="news-search-form"></div> <div id="results-container"> <div class="row top-pagination-area"> <div class="col-md-6 col-sm-12"> <span id="showing-results-text" data-total-pages="37" data-first-record="1" data-last-record="25" data-current-page="1" data-items-per-page="25" data-total-results="905">Showing <strong id="showing-results-first">1</strong> through <strong id="showing-results-last">25</strong> of <strong id="showing-results-total">905</strong> matching records.</span> </div> <div class="col-md-6 col-sm-12"> <span class="pull-right hidden-sm hidden-xs hidden-xxs"> <span class="pagination-links" id="top-pagination-container" data-total-pages="37" data-min-page="1" data-max-page="10" data-current-page="1" data-show-first="False" data-show-last="True"><strong aria-label="Page 1" id="top-page-1">1</strong> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=2" aria-label="Page 2" id="top-page-2">2</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=3" aria-label="Page 3" id="top-page-3">3</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=4" aria-label="Page 4" id="top-page-4">4</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=5" aria-label="Page 5" id="top-page-5">5</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=6" aria-label="Page 6" id="top-page-6">6</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=7" aria-label="Page 7" id="top-page-7">7</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=8" aria-label="Page 8" id="top-page-8">8</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=9" aria-label="Page 9" id="top-page-9">9</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=10" aria-label="Page 10" id="top-page-10">10</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=2" aria-label="Next Page" id="top-page-next">></a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=37" aria-label="Last Page" id="top-page-last" data-last-page-number="37">>></a></span> </span> <p class="text-center hidden-md hidden-lg"> <span class="pagination-links" id="mobile-top-pagination-container" data-total-pages="37" data-min-page="1" data-max-page="10" data-current-page="1" data-show-first="False" data-show-last="True"><strong aria-label="Page 1" id="mobile-top-page-1">1</strong> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=2" aria-label="Page 2" id="mobile-top-page-2">2</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=3" aria-label="Page 3" id="mobile-top-page-3">3</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=4" aria-label="Page 4" id="mobile-top-page-4">4</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=5" aria-label="Page 5" id="mobile-top-page-5">5</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=6" aria-label="Page 6" id="mobile-top-page-6">6</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=7" aria-label="Page 7" id="mobile-top-page-7">7</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=8" aria-label="Page 8" id="mobile-top-page-8">8</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=9" aria-label="Page 9" id="mobile-top-page-9">9</a> | <a href="/web/20230306050852/https://csrc.nist.gov/news?page=10" aria-label="Page 10" id="mobile-top-page-10">10</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=2" aria-label="Next Page" id="mobile-top-page-next">></a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=37" aria-label="Last Page" id="mobile-top-page-last" data-last-page-number="37">>></a></span> </p> </div> </div> <div class="search-results-list" id="search-results-list" data-total-records="905" data-page="1" data-first-record="1" data-last-record="25" data-ipp="25"> <div class="news-list-item" id="result-1"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/draft-nist-ir-8432-available-for-public-comment" id="short-title-1">Draft NIST IR 8432 Available for Public Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-1">March 3, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-1">The National Cybersecurity Center of Excellence (NCCoE) has published the initial public draft of NIST Internal Report (NIST IR) 8432, Cybersecurity of Genomic Data.</p> </div> </div> </div> <div class="news-list-item" id="result-2"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/draft-nist-ir-8320d-available-for-comment" id="short-title-2">Draft NIST IR 8320D Available for Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-2">February 23, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-2">The National Cybersecurity Center of Excellence (NCCoE) has released a draft report, NIST Interagency Report (NISTIR) 8320D, Hardware Enabled Security: Hardware-Based Confidential Computing, for public comment.</p> </div> </div> </div> <div class="news-list-item" id="result-3"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/call-for-feedback-nist-ir-8011-series-adoption" id="short-title-3">Call for Feedback: NIST IR 8011 Series Adoption</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-3">February 22, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-3">NIST Interagency Report (IR) 8011, Automation Support for Security Control Assessments, provides guidance on automating the assessment of controls that can be tested.</p> </div> </div> </div> <div class="news-list-item" id="result-4"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/nist-requests-public-comments-on-sp-800-201" id="short-title-4">NIST Requests Public Comments on SP 800-201</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-4">February 8, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-4">The initial public draft of NIST Special Publication (SP) 800-201, NIST Cloud Computing Forensic Reference Architecture, is now available for public comment.</p> </div> </div> </div> <div class="news-list-item" id="result-5"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/proposal-to-update-sp-800-38e" id="short-title-5">Proposal to Update NIST SP 800-38E</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-5">February 8, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-5">NIST is proposing to update Special Publication (SP) 800-38E, "Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices."聽Please submit public comments by March 10, 2023.</p> </div> </div> </div> <div class="news-list-item" id="result-6"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/lightweight-cryptography-nist-selects-ascon" id="short-title-6">Announcing Lightweight Cryptography Selection</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-6">February 7, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-6">NIST announces the selection of the Ascon family for lightweight cryptography standardization. </p> </div> </div> </div> <div class="news-list-item" id="result-7"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/draft-nist-sp-800-223-available-for-public-comment" id="short-title-7">Draft NIST SP 800-223 is Available for Public Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-7">February 6, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-7">NIST is requesting public comments on the initial public draft of Special Publication (SP) 800-223, High-Performance Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture.</p> </div> </div> </div> <div class="news-list-item" id="result-8"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/nist-releases-fips-186-5-and-sp-800-186" id="short-title-8">NIST Releases FIPS 186-5 and SP 800-186</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-8">February 3, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="frn-container-{% idx %}"> Federal Register Number: <a href="https://web.archive.org/web/20230306050852/https://federalregister.gov/a/2023-02273" target="_blank" id="frn-link-8">2023-02273</a> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-8">Today, NIST is publishing a revised Digital Signature Standard (FIPS 186-5) and Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters (NIST SP 800-186).</p> </div> </div> </div> <div class="news-list-item" id="result-9"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/nist-ir-8323-revision-1-pnt-is-now-available" id="short-title-9">NIST IR 8323 Revision 1 PNT is now Available</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-9">January 31, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-9">NIST is publishing NIST IR 8323r1 (revision 1),聽Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services.聽</p> </div> </div> </div> <div class="news-list-item" id="result-10"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/nist-ir-8214c-ipd-available-for-public-comment" id="short-title-10">NIST IR 8214C ipd Available for Public Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-10">January 25, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-10">NIST requests public comments on NIST IR 8214C ipd (initial public draft), NIST First Call for Multi-Party Threshold Schemes, for primitives organized into two categories: Cat1: selected NIST-specified primitives Cat2:...</p> </div> </div> </div> <div class="news-list-item" id="result-11"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/csf-2-0-concept-paper-released" id="short-title-11">CSF 2.0 Concept Paper Released</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-11">January 19, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-11">The NIST Cybersecurity Framework (CSF) helps organizations better understand, manage, reduce, and communicate cybersecurity risks. NIST is updating the CSF to keep pace with the evolving cybersecurity landscape.聽</p> </div> </div> </div> <div class="news-list-item" id="result-12"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/nist-releases-two-draft-guidelines-on-piv" id="short-title-12">NIST Releases Two Draft Guidelines on PIV Credentials</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-12">January 10, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-12">NIST is announcing the initial public drafts of NIST SP 800-157r1 (Revision 1), "Guidelines for Derived Personal Identity Verification (PIV) Credentials," and NIST SP 800-217, "Guidelines for Personal Identity Verification...</p> </div> </div> </div> <div class="news-list-item" id="result-13"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/public-comments-requested-on-sp-800-132" id="short-title-13">Public Comments Requested on SP 800-132</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-13">January 6, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-13">NIST is currently reviewing SP 800-132, "Recommendation for Password-Based Key Derivation: Part 1: Storage Applications," (2010) and is requesting public feedback on all aspects of the publication by February 24, 2023.</p> </div> </div> </div> <div class="news-list-item" id="result-14"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2023/nist-releases-nist-ir-8401" id="short-title-14">NIST Releases NIST IR 8401</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-14">January 3, 2023</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-14">NIST recognizes the importance of the infrastructure that provides positioning, timing, and navigation (PNT) information to the scientific knowledge, economy, and security of the Nation. This infrastructure consists of three...</p> </div> </div> </div> <div class="news-list-item" id="result-15"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/withdrawal-of-nist-sp-800-107-revision-1" id="short-title-15">Withdrawal of NIST SP 800-107 Revision 1</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-15">December 20, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-15">NIST has decided to withdraw Special Publication 800-107 Revision 1 after moving some of its requirements to a new CMVP Implementation Guidance (IG).</p> </div> </div> </div> <div class="news-list-item" id="result-16"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/aes-draft-fips-197-update-available-for-comment" id="short-title-16">Proposal to Update FIPS 197, The Advanced Encryption Standard</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-16">December 19, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-16">NIST's Crypto Publication Review Board is proposing to update FIPS 197, and public comments are due on the draft by February 13, 2023. No technical changes are being made to the standard. This announcement summarizes the...</p> </div> </div> </div> <div class="news-list-item" id="result-17"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/nist-draft-revision-4-of-sp-800-63" id="short-title-17">NIST Draft Revision 4 of SP 800-63: Digital Identity Guidelines</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-17">December 16, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-17">Revision 4 of NIST鈥檚 Special Publication 800-63,聽Digital Identity Guidelines,聽intends to respond to the changing digital landscape that has emerged since the聽last major revision of this suite (2017)鈥攊ncluding the real-world...</p> </div> </div> </div> <div class="news-list-item" id="result-18"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/nist-transitioning-away-from-sha-1-for-all-apps" id="short-title-18">NIST Transitioning Away from SHA-1 for All Applications</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-18">December 15, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-18">NIST is introducing a plan to transition away from the current limited use of the Secure Hash Algorithm 1 (SHA-1) hash function. Other approved hash functions are already available. The transition will be completed by...</p> </div> </div> </div> <div class="news-list-item" id="result-19"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/withdrawal-of-nist-sp-800-106" id="short-title-19">Withdrawal of NIST Special Publication 800-106</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-19">December 15, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-19">NIST SP 800-106, "Randomized Hashing for Digital Signatures" is being withdrawn.</p> </div> </div> </div> <div class="news-list-item" id="result-20"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/proposal-to-revise-fips-180-4-secure-hash-standard" id="short-title-20">Proposal to Revise FIPS 180-4, Secure Hash Standard (SHS)</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-20">December 15, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-20">NIST is proposing to revise FIPS 180-4. Please submit public comments by January 31, 2023.</p> </div> </div> </div> <div class="news-list-item" id="result-21"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/nist-releases-two-draft-nist-irs-for-olir" id="short-title-21">NIST Releases Two Draft NIST IRs for OLIR Available for Comment</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-21">December 8, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-21">NIST is seeking public comments on two draft NIST Internal Reports (NIST IR) for the National Online Informative References (OLIR) Program.聽</p> </div> </div> </div> <div class="news-list-item" id="result-22"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/sp-800-215-secure-enterprise-network-landscape" id="short-title-22">NIST Publishes SP 800-215: Guide to a Secure Enterprise Network Landscape</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-22">November 17, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-22">NIST has published Special Publication (SP) 800-215,聽Guide to a Secure Enterprise Network Landscape.</p> </div> </div> </div> <div class="news-list-item" id="result-23"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/nist-releases-nistir-8286d" id="short-title-23">NIST Releases IR 8286D</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-23">November 17, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-23">Business impact analyses (BIAs) have been traditionally used for business continuity and disaster recovery (BC/DR) planning to understand the potential impacts of outages that compromise IT infrastructure.聽</p> </div> </div> </div> <div class="news-list-item" id="result-24"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/workshop-on-performance-measurement-guide-info-sec" id="short-title-24">NIST Workshop on Performance Measurement Guide for Information Security</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-24">November 16, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-24">The NIST Cybersecurity Risk Analytics Team is hosting a virtual workshop to provide an overview of the proposed changes to聽Special Publication 800-55, Revision 2,聽Performance Measurement Guide for Information Security. The...</p> </div> </div> </div> <div class="news-list-item" id="result-25"> <div class="row"> <div class="col-sm-12 news-list-title"> <strong><a href="/web/20230306050852/https://csrc.nist.gov/News/2022/guidance-on-engineering-trustworthy-secure-systems" id="short-title-25">NIST Releases Revised Guidance on Engineering Trustworthy Secure Systems</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong id="news-date-25">November 16, 2022</strong> </small> </div> <div class="col-sm-4"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12"> <p id="news-teaser-25">NIST has released a major revision to聽Special Publication (SP) 800-160 Volume 1,聽Engineering Trustworthy Secure Systems.</p> </div> </div> </div> </div> <div class="row bottom-pagination-area"> <p class="text-center"> <span class="pagination-links" id="bottom-pagination-container" data-total-pages="37" data-min-page="1" data-max-page="10" data-current-page="1" data-show-first="False" data-show-last="True"><strong aria-label="Page 1" id="bottom-page-1">1</strong> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=2" aria-label="Page 2" id="bottom-page-2">2</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=3" aria-label="Page 3" id="bottom-page-3">3</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=4" aria-label="Page 4" id="bottom-page-4">4</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=5" aria-label="Page 5" id="bottom-page-5">5</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=6" aria-label="Page 6" id="bottom-page-6">6</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=7" aria-label="Page 7" id="bottom-page-7">7</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=8" aria-label="Page 8" id="bottom-page-8">8</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=9" aria-label="Page 9" id="bottom-page-9">9</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=10" aria-label="Page 10" id="bottom-page-10">10</a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=2" aria-label="Next Page" id="bottom-page-next">next ></a> <a href="/web/20230306050852/https://csrc.nist.gov/news?page=37" aria-label="Last Page" id="bottom-page-last" data-last-page-number="37">last >></a></span> </p> </div> <p id="relevanceInfo">* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.</p> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20230306050852im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20230306050852/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20230306050852/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20230306050852/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20230306050852/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20230306050852/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20230306050852/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20230306050852/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-info" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20230306050852im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20230306050852/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20230306050852/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20230306050852/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20230306050852js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20230306050852js_/https://csrc.nist.gov/dist/app.bundle.js"></script> <!-- reCAPTCHA v3 --> <script defer src="https://web.archive.org/web/20230306050852js_/https://www.google.com/recaptcha/api.js?render=6LcQo40UAAAAAJpAj4X-i-WfOzdbu6d7j7kKryDS"></script> </body> </html> <!-- FILE ARCHIVED ON 05:08:52 Mar 06, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 23:36:14 Feb 19, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.537 exclusion.robots: 0.027 exclusion.robots.policy: 0.016 esindex: 0.01 cdx.remote: 34.723 LoadShardBlock: 2068.702 (3) PetaboxLoader3.resolve: 295.136 (4) PetaboxLoader3.datanode: 1823.766 (4) load_resource: 167.172 -->