![NIST](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/17142818/nist-logo-x-400x200.jpg)
NIST Privacy Framework 1.0: Manage privacy risk, demonstrate compliance
Our data-driven society has a tricky balancing act to perform: building innovative products and services that use personal data while still protecting people’s privacy. To …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102340/face2-400x200.jpg)
Inside the NIST team working to make cybersecurity more user-friendly
Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094507/check-400x200.jpg)
Researchers develop new tool for safety-critical software testing
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the National Institute …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100112/healthcare-400x200.jpg)
Healthcare orgs have to achieve true cybersecurity, not only compliance
How many organizations in the healthcare sector are conforming with the HIPAA Security and Privacy Rules and the National Institute of Standards and Technology Cybersecurity …
![G Suite](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102108/gsuite-400x200.jpg)
G Suite admins can now disable SMS and voice 2FA
G Suite administrators can now prevent enterprise users from using SMS and voice codes as their second authentication/verification factor for accessing their accounts. The …
![NIST Cybersecurity Framework](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095235/nist-framework-anniversary-400x200.jpg)
NIST Cybersecurity Framework: Five years later
Five years after the release of the Framework for Improving Critical Infrastructure Cybersecurity, organizations across all sectors of the economy are creatively deploying …
![measure](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102801/measure-400x200.jpg)
Vulnerabilities’ CVSS scores soon to be assigned by AI
The National Institute of Standards and Technology (NIST) is planning to use IBM’s Watson to evaluate how critical publicly reported computer vulnerabilities are and …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Most executives around the world see untrained staff as the greatest cyber risk
The majority of executives (87%) around the world cite untrained staff as the greatest cyber risk to their business according to a new report produced by ESI ThoughtLab in …
Xacta 360 operationalizes NIST Cybersecurity Framework 1.1
Telos announced a new application for its Xacta 360 cyber risk management platform that streamlines execution of the NIST Cybersecurity Framework (CSF) and automates …
![critical infrastructure](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101724/critical-infrastructure-400x200.jpg)
NIST releases Cybersecurity Framework 1.1
The US Commerce Department’s National Institute of Standards and Technology (NIST) has announced at RSA Conference 2018 the release of version 1.1 of its popular Framework for …
![IoT connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104554/iot-connection-400x200.jpg)
For timely vulnerability information, unofficial sources are a better bet
From over 12,500 disclosed Common Vulnerabilities and Exposures (CVEs), more than 75% were publicly reported online before they were published to the NIST’s centralized …
![Users lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111610/users-lock-400x200.jpg)
NICE framework: Resource for a strong cybersecurity workforce
The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) released a resource that will help U.S. employers more effectively identify, recruit, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD