Loading...

Follow NSTIC NOTES on Feedspot

Continue with Google
Continue with Facebook
or

Valid

As we mentioned in our last feedback blog, the NIST Cybersecurity for the Internet of Things (IoT) Program has been engaging with public, private, and academic stakeholders through conferences, meetings, and participation in roundtables at industry events. Most recently, we attended:

  • The
...Read more
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

As part of our mission, the NIST Cybersecurity for the Internet of Things (IoT) Program develops guidelines for improving the cybersecurity of connected devices and the environments in which they are deployed. We are working on an introduction to managing IoT security and privacy risk for federal systems — an undertaking that would not be possible without stakeholder input.

To inform our approach to IoT security and privacy, we have been engaging with public and private sector stakeholders through conferences, meetings, and feedback submitted via email. We’ve

...Read more
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Our research shows that there is no one-size-fits-all approach to securing the Internet of Things. That’s why we have released Draft NISTIR 8200, Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT)—and why we want to hear from you.

With this draft report, we hope to inform and enable policymakers, managers and standards participants as they seek timely development and use of cybersecurity

...Read more
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
It can be hard to serve as an early adopter of new technology. It usually means having very few (or no) examples to demonstrate what to do…and what not to do. Being the guinea pig is no easy feat, but we at the NSTIC NPO are embracing the challenge since we believe this is vital to facilitating the commercial adoption of identity solutions. After all, the NSTIC was clear that building a healthy identity ecosystem would require government to eat its own dog food.Read more
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
I’ve said it before and I’ll say it again: NIST’s efforts in defining measurement science and metrics in digital identity management must be aligned with the goals of the community. Today I’m pleased to announce the draft release of NISTIR 8103: Advanced Identity Workshop on Applying Measurement Science in the Identity Ecosystem: Summary and Next Steps. This document summarizes two days of discussion from the over 220 participants at NIST’s workshop last month in Gaithersburg, Maryland, and provides a brief glance at how we intend to move forward in these important topics.Read more
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
For Immediate Release: September 20, 2012 The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) today announced more than $9 million in grant awards to support the National Strategy for Trusted Identities in Cyberspace (NSTIC). Five U.S. organizations will pilot identity solutions that increase confidence in online transactions, prevent identity theft, and provide individuals with more control over how they share their personal information. NSTIC is a White House
...Read more
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
In just 18 months, the IDESG has come a long way from its chaotic first meeting in Chicago. The phrase of the week for over 200 total in-person and virtual attendees this month at the Identity Ecosystem Steering Group (IDESG) plenary in Atlanta: keep your foot on the gas. With this in mind, attendees set their sights on a challenge laid down by and a senior White House cyber security official in the opening keynote: develop a trustmark scheme by the end of 2014, backed by a handful of high profile early adopters.Read more
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Last September, NIST awarded grants to five organizations to stand up NSTIC pilots focused on advancing the NSTIC vision, objectives and guiding principles, demonstrating innovative frameworks that can provide a foundation for the Identity Ecosystem, and tackling barriers that have, to date, impeded the Identity Ecosystem from being fully realized. Six months into the implementation of the pilots, they are all making great progress – as will be evidenced when they make a formal presentation to the Identity Ecosystem Steering Group (IDESG) plenary next month.  Progress...Read more
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Among the questions we’re asked most frequently about NSTIC is: why are trusted identities good for business? The NSTIC pilots have collectively started to answer that question, highlighting how better privacy, security and convenience are enabling new online business models, and driving higher sales and profits.Read more
Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview