![NIST](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/17142818/nist-logo-x-400x200.jpg)
NIST chooses encryption algorithms for lightweight IoT devices
ASCON is the name of the group of lightweight authenticated encryption and hashing algorithms that the U.S. National Institute of Standards and Technology (NIST) has chosen to …
![company report](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/11142950/company_report_1200-400x200.jpg)
MITRE CREF Navigator empowers enterprises to improve cyber resiliency strategies
MITRE released the Cyber Resiliency Engineering Framework (CREF) Navigator — a free, visualization tool that allows organizations to customize their cyber resiliency goals, …
![NIST](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/17142818/nist-logo-x-400x200.jpg)
NIST unveils four quantum-resistant encryption tools to protect sensitive electronic information
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has chosen the first group of quantum-resistant encryption tools, designed to withstand …
![quantum](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104847/quantum-400x200.jpg)
NIST selects 4 quantum-resistant encryption algorithms
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has chosen the first group of quantum-resistant encryption tools, designed to withstand …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112354/chain-400x200.jpg)
NIST updates guidance for cybersecurity supply chain risk management
The National Institute of Standards and Technology (NIST) has updated its guidance document for helping organizations identify, assess and respond to cybersecurity risks …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19122705/lock-silver-400x200.jpg)
Security standards should be strengthened outside the federal government too
Tripwire announced the results of a research report that evaluated actions taken by the federal government to improve cybersecurity in 2021. Conducted by Dimensional Research, …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
Titania Nipper NIST 800-171 module protects controlled and sensitive government information
Titania launched a new dedicated module to assess NIST 800-171 compliance for core network devices. The module, an add-on to Titania’s Nipper product, allows any organization …
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
CyberLink integrates FaceMe Facial Recognition into FaceScan’s temperature screening kiosks
CyberLink announced a partnership for the integration of its FaceMe Facial Recognition into FaceScan’s temperature screening kiosks. The FaceScan no contact temperature …
![certification](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092550/certification_1200-400x200.jpg)
Pondurance receives Registered Provider Organization status from the CMMC-AB
Pondurance announced that it was recently approved as a Registered Provider Organization (RPO) by the Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB). …
![Software](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111332/software_1200-400x200.jpg)
Outseer expands fraud prevention value for customers with identity-centric capabilities
Outseer announced new identity-centric capabilities for Outseer Fraud Manager product offering. The two innovations include: New solution for account enrollment protection: …
Cybernance provides certified audit assessments for advanced cyber security protections
Cybernance announced a major extension of its cyber maturity and risk platform to now include a fully featured audit capability. The Cybernance Platform is based on industry …
Qualys Ransomware Risk Assessment Service helps organizations to proactively combat ransomware attacks
Qualys released its Ransomware Risk Assessment Service to provide companies with visibility into their ransomware exposure and automate the patching and configuration changes …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD