The National Institute of Standards and Technology (NIST) has releases its Security Publication (SP) 800-177 Revision 1, that include security guidelines and recommendations for achieving “trustworthy email”.
The National Institute of Standards and Technology (NIST) has released its Security Publication (SP) 1800-4, that includes security guidelines for mobile device security in cloud and hybrid environments.
The National Institute of Standards and Technology (NIST) has released its Security Publication (SP) 800-37 Rev. 2: “Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy.”
President Donald Trump signed the NIST Small Business Cybersecurity Act into law, legislation authored by U.S. Senators Brian Schatz (D-Hawai‘i) and James Risch (R-Idaho).
Reddit, a popular social news aggregation and discussion website, suffered from a security breach between June 14 and June 18 this year.
The Center for Internet Security (CIS) has released its next revision (Version 7) of the top 20 Critical Security Controls.
You may have wondered what application containers are, let alone how to secure them. The National Institute of Standards and Technology (NIST) sets out to explain the benefits and security concerns with application container technologies in the latest Special Publication (SP 800-190) Application Container Security Guide.
The NIST standard, SP 800-177 Revision 1, Trustworthy Email (Draft) was released last month and offers up-to-date security guidance to include SPF, DKIM, DMARC, and email digital signatures and encryption (via S/MIME), among others.
In case you missed it, the National Institute of Standards and Technologies (NIST) published a new guideline “An Introduction to Information Security” for individuals looking to get a better understanding of introductory information security best practices.
In this article, we take the mystique out of many of the most popular security standards and guidelines and highlight a few of the key resources available at your fingertips. By implementing some of these best practices, your business will be better prepared to keep your sensitive data safe and protect your brand from cyber attackers.