Feb 08, 2023Ravie LakshmananEncryption / IoT Security The U.S. National Institute of Standards and Technology (NIST) has announced that a family of authenticated encryption and hashing algorithms known as Ascon will be standardized for lightweight cryptography applications. "The chosen algorithms are designed to protect information created and transmitted by the Internet of … [Read more...] about NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices
NIST
NIST Retires 27-Year-Old Widely Used Cryptographic Algorithm
Dec 16, 2022Ravie LakshmananEncryption / Data Security The U.S. National Institute of Standards and Technology (NIST), an agency within the Department of Commerce, announced Thursday that it's formally retiring the SHA-1 cryptographic algorithm. SHA-1, short for Secure Hash Algorithm 1, is a 27-year-old hash function used in cryptography and has since been deemed broken owing … [Read more...] about NIST Retires 27-Year-Old Widely Used Cryptographic Algorithm
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has chosen the first set of quantum-resistant encryption algorithms that are designed to "withstand the assault of a future quantum computer." The post-quantum cryptography (PQC) technologies include the CRYSTALS-Kyber algorithm for general encryption, and CRYSTALS-Dilithium, FALCON, and … [Read more...] about NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
Learn NIST Inside Out With 21 Hours of Training @ 86% OFF
In cybersecurity, many of the best jobs involve working on government projects. To get a security clearance, you need to prove that you meet NIST standards. Cybersecurity firms are particularly interested in people who understand the RMF, or Risk Management Framework — a U.S. government guideline for taking care of data. The NIST Cybersecurity & Risk Management Frameworks … [Read more...] about Learn NIST Inside Out With 21 Hours of Training @ 86% OFF
Mapping Secure Endpoint (and Malware Analytics) to NIST CSF Categories and Sub-Categories
Cisco Secure Endpoint (AMP for Endpoints) with Malware Analytics (ThreatGrid) offers Prevention, Detection, Threat Hunting and Response capabilities in a single solution. It protects Endpoints (Windows, Mac, Linux, Android, and iOS) and prevents breaches, blocks malware at the point of entry and continuously monitors and analyses files and processes to quickly detect, contain, … [Read more...] about Mapping Secure Endpoint (and Malware Analytics) to NIST CSF Categories and Sub-Categories
Mapping Secure Network Analytics (and Cognitive) to NIST CSF Categories and Sub-Categories
Secure Network Analytics uses flow telemetry such as NetFlow, jFlow, sFlow, IPFIX, and packet-level data and helps in reducing the risk to an organisation. It offers network performance monitoring, behaviour-based anomaly detection and advanced threat detection to deliver network visibility into physical and virtual environments from a single platform. NIST CSF Categories and … [Read more...] about Mapping Secure Network Analytics (and Cognitive) to NIST CSF Categories and Sub-Categories
Cisco Secure: Supporting NIST Cybersecurity Framework
Extending the alignment to include more Cisco products Why should you care? With so many security frameworks, it can be difficult to know where to start from. While many organizations are challenged with managing and improving their cybersecurity programs against the dynamic threat landscape, it’s not easy to pick one framework over another. So where do they start from – ISACA … [Read more...] about Cisco Secure: Supporting NIST Cybersecurity Framework
Creating A Strong Password Policy With Specops and NIST Guidelines
End-user passwords are one of the weakest components of your overall security protocols. Most users tend to reuse passwords across work and personal accounts. They may also choose relatively weak passwords that satisfy company password policies but can be easily guessed or brute-forced. Your users may also inadvertently use breached passwords for their corporate account … [Read more...] about Creating A Strong Password Policy With Specops and NIST Guidelines