IT Agents  >   Government Agencies (U.S.)  >   Department of Commerce  >  

NIST

RSS Feed   
DEFINITION: The NIST 800 Series is a set of documents that describe United States federal government computer security policies, procedures and guidelines. NIST (National Institute of Standards and Technology) is a unit of the Commerce Department. The documents are available free of charge, and can be useful to businesses and educational institutions, as well as to government agencies.NIST 800 Series publications  … 

NIST definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
NIST Reports
 
The Need for Cloud Computing Security Standards
sponsored by SearchSecurity.com
EGUIDE: While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

NIST Cybersecurity Framework Implementation Overview
sponsored by Absolute Software Corporation
WHITE PAPER: In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation. Read on to get started.
Posted: 17 Feb 2020 | Published: 29 Oct 2018

Absolute Software Corporation

NIST Cybersecurity Framework Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The NIST Cybersecurity Framework (CSF) outlines specific actions and guidelines for organizations to undertake in order to improve security hygiene and meet regulatory requirements. In this evaluation guide, take a closer look at the 5 pillars of the NIST CST and learn how the Absolute platform aligns with the action items.
Posted: 20 Feb 2020 | Published: 02 Oct 2018

Absolute Software Corporation

NIST Maturity Report
sponsored by Optiv
RESOURCE: The National Institute of Standards and Technology (NIST) cybersecurity framework exists to help organizations better understand, manage, and decrease cybersecurity risk. How aligned is your security program to this industry-accepted framework? Determine your NIST alignment by taking this quick quiz today.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Optiv

High Performance, High Capacity 2048/4096-bit SSL Offload
sponsored by A10 Networks
WHITE PAPER: This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
Posted: 24 Sep 2013 | Published: 28 Feb 2013

A10 Networks

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE: Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012

DLT Solutions

DNSSEC - Secure DNS For Government
sponsored by BlueCat
WHITE PAPER: This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.
Posted: 01 Sep 2010 | Published: 31 Aug 2010

BlueCat

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
sponsored by ISACA
WHITE PAPER: This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives.
Posted: 10 Feb 2010 | Published: 01 Dec 2009

ISACA

Chronicle Cybersecurity Predictions Crimeware, Cloud and Beyond
sponsored by Chronicle
WHITE PAPER: Cyberattacks are inevitable, affecting business of any size across all industries. While tactics used by cybercriminals always changes, it remains certain that security teams will always be on the lookout for threats to their networks. In this white paper, explore cybersecurity predictions for 2020 to ensure your organization is prepared.
Posted: 10 Feb 2020 | Published: 31 Dec 2019

Chronicle
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info