![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
In the era of AI, standards are falling behind
According to a recent study, only a minority of software developers are actually working in a software development company. This means that nowadays literally every company …
![NIST](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/17142818/nist-logo-x-400x200.jpg)
NIST crowdsourcing challenge aims to de-identify public data sets to protect individual privacy
NIST has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect individual privacy. The …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
NIST guide to help orgs recover from ransomware, other data integrity attacks
The National Institute of Standards and Technology (NIST) has published a cybersecurity practice guide enterprises can use to recover from data integrity attacks, i.e., …
![NIST](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/17142818/nist-logo-x-400x200.jpg)
Only 44% of healthcare providers conform to protocols outlined by the NIST CSF
Only 44% of healthcare providers, including hospital and health systems, conformed to protocols outlined by the NIST CSF – with scores in some cases trending backwards …
![NIST Phish Scale](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/18131512/nist-phish_scale-400x200.jpg)
Phish Scale: New method helps organizations better train their employees to avoid phishing
Researchers at the National Institute of Standards and Technology (NIST) have developed a new method called the Phish Scale that could help organizations better train their …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101705/cloud-400x200.jpg)
Most security pros are concerned about human error exposing cloud data
A number of organizations face shortcomings in monitoring and securing their cloud environments, according to a Tripwire survey of 310 security professionals. 76% of security …
![NIST mask research](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/28114110/nist-facemask-research-400x200.jpg)
How well do face recognition algorithms identify people wearing masks?
Now that so many of us are covering our faces to help reduce the spread of COVID-19, how well do face recognition algorithms identify people wearing masks? The answer, …
![quantum](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104847/quantum-400x200.jpg)
NIST selects algorithms to form a post-quantum cryptography standard
The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch. Post-quantum cryptography standard After spending …
![Jason Coder](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/28124444/jason_coder-400x200.jpg)
A math formula could help 5G networks efficiently share communications frequencies
Researchers at the National Institute of Standards and Technology (NIST) have developed a mathematical formula that, computer simulations suggest, could help 5G and other …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
Modern crypto standards pave the way to stronger security
Cyberthreats are a ubiquitous concern for organizations operating in the digital world. No company is immune — even large and high-profile organizations like Adobe, Yahoo, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/28093729/rsac2020-26-400x200.jpg)
Photos: RSA Conference 2020, part 4
RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from …
![NIST JTAG](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/03155912/nist-jtag-400x200.jpg)
Scientists test forensic methods to acquire data from damaged mobile phones
Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD