The National Cybersecurity Center of Excellence is urging utility companies to change decentralized identity management practices at their facilities to shore up a weak link against online attack.
Federal agencies are increasingly engaged in cybersecurity issues and understand they have something to protect, said the White House's cybersecurity czar, but he added that most agencies, like their private-sector counterparts, are not protecting themselves as well as they should.
The National Cybersecurity Center of Excellence is seeking vendor products and technical expertise on three projects that focus on mobile device security, personal identity verification credentials for such devices and access control.
Development of international cybersecurity standards would improve the security resilience of U.S. information and communications systems and their supporting infrastructures, and efforts should include greater training and more collaboration with industry.
As several recent, private sector breaches have illustrated, personally identifiable information, or PII, is not immune to cyber threats.
NIST announced last week that the final version of its Secure Hash Algorithm-3 standard, or SHA-3, is complete. The cryptographic hash will be used to retain document security and integrity across the government, as the tech provides a tool that helps guarantee the veracity of electronic communications.
The National Institute of Standards and Technology plans to keep the momentum from the Global Cities Teams Challenge 2015 rolling into next year.
The National Institute of Standards of Technology has developed a draft solution to help agencies with the difficult task of providing multifactor authentication when accessing government information systems via mobile devices.
Participants must use at least one of the agency's eligible datasets, which pertain to physics and chemistry and often used by high school, college and graduate students. One example is the computational chemistry comparison and benchmark database.
The National Cybersecurity Center of Excellence has released its first draft of a step-by-step, how-to guide mapping out how healthcare providers can make mobile devices more secure and protect sensitive patient information.