Tag Archive for: nist

New NIST guidelines banish periodic password changes

New NIST guidelines do away with periodic password changes

New draft guidelines have been issued by NIST are recommending that users should not be forced to periodically change their passwords.

Guest contributor Bob Covello reports.

Graham Cluley

NIST drafts mobile security guidelines for responder tech – GCN.com (blog)


GCN.com (blog)

NIST drafts mobile security guidelines for responder tech
GCN.com (blog)
NIST drafts mobile security guidelines for responder tech. There's arguably been no corner of government that's profited more from the mobile revolution than the first responder community. The ability to quickly access public safety data in the field
SMS Two-Factor Authentication: Time to Trash the Text?Security Intelligence (blog)
DRAFT NIST Special Publication 800-63B – NIST Pages – National Institute of Standards and TechnologyNIST Pages – National Institute of Standards and Technology

all 19 news articles »

“mobile security” – read more

NIST Seeks Sources for Technical Support to Computer Security Division – ExecutiveBiz (blog)

NIST Seeks Sources for Technical Support to Computer Security Division
ExecutiveBiz (blog)
security lock chip The National Institute of Standards and Technology has started a search for sources of general, technical and scientific expertise and support for the agency's computer security division. In a notice posted Dec. 21 on FedBizOpps

“computer security” – read more

Deploying application whitelisting? NIST has some advice for you

If you’re trying to bar the door to malware infections, automated application whitelisting is a tactic that the U.S. National Institute of Standards and Technology thinks you should try — and the agency wants to help you implement it in an effective way.

The Department of Commerce agency, which is tasked with developing standards and recommendations including in the area of IT security, has published a guide to application whitelisting that explains the technology in detail and offers practical advice for how it should be used.

For one, before looking at third-party products, organizations should consider using the application whitelisting mechanisms included in the operating systems they use on their desktops, laptops and servers. The reason is that they’re easier to use, can be centrally managed and their use keeps additional costs minimal.

To read this article in full or to leave a comment, please click here

Network World Security