サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
アメリカ大統領選
www.nist.gov
GAITHERSBURG, Md. — Today, the U.S. Artificial Intelligence Safety Institute at the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) announced agreements that enable formal collaboration on AI safety research, testing and evaluation with both Anthropic and OpenAI. Each company’s Memorandum of Understanding establishes the framework for the U.S. AI Safety Institut
NIST’s cybersecurity framework (CSF) now explicitly aims to help all organizations — not just those in critical infrastructure, its original target audience — to manage and reduce risks. NIST has updated the CSF’s core guidance and created a suite of resources to help all organizations achieve their cybersecurity goals, with added emphasis on governance as well as supply chains. This update is the
Here’s a pop quiz for cybersecurity pros: Does your security team consider your organization’s employees to be your allies or your enemies? Do they think employees are the weakest link in the security chain? Let’s put that last one more broadly and bluntly: Does your team assume users are clueless? Your answers to those questions may vary, but a recent article by National Institute of Standards an
Abstract The skilled and dedicated professionals who strive to improve cyber security may unwittingly fall victim to misconceptions and pitfalls that hold customers and users back from reaching their full potential of being active partners in security. These pitfalls often reflect the cyber security community's dependence on technology and failure to fully appreciate the human element. This articl
On July 26, 2024, NIST released NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile. Developed in part to fulfill an October 30, 2023 Executive Order, the profile can help organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities. The U.
The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of Standards and Technology (NIST). The agency is now recommending that IT professionals replace SHA-1, in the limited situations where it is still used, with newer algorithms that are more secure. SHA-1, who
GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has chosen the first group of encryption tools that are designed to withstand the assault of a future quantum computer, which could potentially crack the security used to protect privacy in the digital systems we rely on every day — such as online banking and email software. The four selecte
NIST is developing the Privacy Framework in stages to enable the greatest amount of engagement and feedback from the public. This page contains the documents for the current stage of development. Preliminary Draft of the Privacy Framework Posted September 6, 2019 The National Institute of Standards and Technology (NIST) seeks comments on the Preliminary Draft of the NIST Privacy Framework: A Tool
Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock ( A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Researchers at the National Institute of Standards and Technology (NIST) have combined derivatives of two surplus materials—wood pulp and dried-up pieces of an invasive exotic pest—to form a new composite material that is flexible, sustainable, nontoxic and UV light-reflective. The material, described in a new paper published in Advanced Functional Materials, could soon be used in a wide variety o
GAITHERSBURG, Md.—The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) has released version 1.1 of its popular Framework for Improving Critical Infrastructure Cybersecurity, more widely known as the Cybersecurity Framework. “Cybersecurity is critical for national and economic security,” said Secretary of Commerce Wilbur Ross. “The voluntary NIST Cybersecurity Framew
Notice: Since November 15, 2021, WWV and WWVH has been broadcasting a test signal on minute 8 of each hour on WWV, and minute 48 on WWVH. This signal has been created to assist in ionospheric research, and is a joint effort of the Ham Radio Citizen Science Investigation (HamSCI) and NIST. The signal consists of various tones, chirps, and Gaussian noise bursts. The signal may be modified occasional
Paving the way for transforming the world’s measurement system, an international task force has determined updated values for four fundamental constants of nature. The updated values comprise the last scientific piece of the puzzle for redefining the modern metric system, known as the International System of Units (SI). If approved by an international body next year, the revised SI will enable aut
Framework for Improving Critical Infrastructure Cybersecurity Draft Version 1.1 National Institute of Standards and Technology January 10, 2017 January 10, 2017 Cybersecurity Framework Draft Version 1.1 ii Note to Reviewers on the Update and Next Steps The draft Version 1.1 of Cybersecurity Framework refines, clarifies, and enhances the predecessor version 1.0 Version 1.1 can be implemented by f
Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 February 12, 2014 Cybersecurity Framework Version 1.0 ii Table of Contents Executive Summary.........................................................................................................................1 1.0 Framework Introduction ..................
Recent news reports have questioned the cryptographic standards development process at NIST. We want to assure the IT cybersecurity community that the transparent, public process used to rigorously vet our standards is still in place. NIST would not deliberately weaken a cryptographic standard. We will continue in our mission to work with the cryptographic community to create the strongest possibl
Station InformationUpdate 11 October 2024: As of 10 October 2024, 2300 UTC, WWVB is operating at full power. NIST radio station WWVB is located on the same site as NIST HF radio station WWV near Fort Collins, Colorado. The WWVB broadcasts are used by millions of people throughout North America to synchronize consumer electronic products like wall clocks, clock radios and wristwatches. In addition,
The National Institute of Standards and Technology (NIST) today announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the fundamental tools of modern information security. The winning algorithm, Keccak (pronounced "catch-ack"), was created by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP Semiconduc
[SAMATE Home | IntrO TO SAMATE | SARD | SATE | Bugs Framework | Publications | Tool Survey | Resources] For our purposes, a source code security analyzer examines source code todetect and report weaknesses that can lead to security vulnerabilities.They are one of the last lines of defense to eliminate software vulnerabilities during development or after deployment. A Source Code Security Analysis
NIST Standard Reference Database 124 Last Update to Data Content: July 2017 | NISTIR 4999 | Version History | Disclaimer | DOI: https://dx.doi.org/10.18434/T4NC7P M.J. Berger1, J.S. Coursey2, M.A. Zucker2 and J. Chang2 1National Institute of Standards and Technology (NIST), Physics Laboratory (now Physical Measurement Laboratory (PML)), Ionizing Radiation Division (deceased) 2NIST, Physics Laborat
NIST Standard Reference Database 126Last Update to Data Content: July 2004 | NISTIR 5632 | Version History | Disclaimer | DOI: https://dx.doi.org/10.18434/T4D01F Tables of X-Ray Mass Attenuation Coefficients and Mass Energy-Absorption Coefficients from 1 keV to 20 MeV for Elements Z = 1 to 92 and 48 Additional Substances of Dosimetric Interest*J. H. Hubbell+ and s.seltzer [at] nist.gov (S. M. Selt
* Download Expect source from SourceForge * Download Expect binaries from ActiveState* Expect HomepageExpect is a tool for automating interactive applications such as telnet, ftp, passwd, fsck, rlogin, tip, etc. Expect really makes this stuff trivial. Expect is also useful for testing these same applications. And by adding Tk, you can wrap interactive applications in X11 GUIs. Expect can make easy
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics (On-deman
Leveraging NIST’s century-long partnership with the electric industry, we are collaborating with our partners to address this generation’s grand challenge—modernizing the electric power grid so that it incorporates information technology to deliver electricity efficiently, reliably, sustainably, and securely. A modernized grid enables all participants to benefit from the new introduction of new te
Elemental Data Index Provides access to the holdings of NIST Physical Measurement Laboratory online data organized by element. Periodic Table: Atomic Properties of the Elements Contains NIST critically-evaluated data on atomic properties of the elements. Suitable for high-resolution color printing for desk or wall-chart display. Physical Constants Contains values of the fundamental physical consta
次のページ
このページを最初にブックマークしてみませんか?
『National Institute of Standards and Technology』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く