Insights

Cybersecurity Awareness Month: Be Cyber Smart

This week’s blog post highlighting Cybersecurity Awareness Month kicks off our series and is from NIST’s Dave Temoshok, Senior Advisor in the Information Technology Laboratory Applied Cybersecurity Division. In this post, Dave discusses how to “Be Cyber Smart” with passwords by using Multifactor Authentication best practices. How did you end up at NIST working on cybersecurity projects? I currently serve as the Senior Advisor in the NIST Information Technology Laboratory Applied Cybersecurity Division. In general, I am…

Read More

Virtual Events Amplify NIST’s Cybersecurity and Privacy International Engagements

Credit: Shutterstock/Anton Balazh For the past many months, NIST has taken advantage of the shift to online events to deepen our international engagement. NIST looked overseas as we kicked off our virtual Cybersecurity Risk Management webinar series in May, along with our co-hosts from the Center for Cybersecurity Policy and Law.  The event on May 25 drew registrants from over 70 countries and we shared and heard perspectives on international cybersecurity risk management.  The event…

Read More

Staff Spotlight: NIST’s Human Factors Scientist

For years, NIST has been conducting research in the areas of human-centered design and evaluation, usable cybersecurity, public safety communication technology, augmented-reality usability, biometrics usability, human factors, and cognitive engineering. We asked Yee-Yin Choong, a Human Factors Scientist in the Visualization and Usability Group, Information Technology Laboratory at NIST about her research and experience working in this unique field. Yee-Yin’s research goal is to understand people’s perceptions, expectations, experiences, and behaviors of human-system interactions –…

Read More

Automatic Proofs of Differential Privacy

Credit: metamorworks/shutterstock.com We are excited to introduce our fourth guest author in this blog series, Chike Abuah, PhD student in computer science at the University of Vermont, whose research expands the state of the art in the subject of this blog post: static and dynamic analysis approaches to automatic proofs of differential privacy. – Joseph Near and David Darais Previously, we have discussed some differentially private algorithms and implementation bugs which can cause these algorithms…

Read More

IoT Non-Technical Supporting Capabilities: You Talked, We Listened

Credit: Shutterstock/Cagkan Sayin As part of our ongoing community engagement following the publication of four IoT cybersecurity draft documents in December 2020, NIST conducted a quartet of roundtable discussions in June 2021 focused on draft NISTIR 8259B, IoT Non-Technical Supporting Capability Core Baseline. The roundtables spanned four weeks, and addressed the four core capabilities defined in NISTIR 8259B as well as general discussions on applying the baseline: June 8:  Documentation June 15:  Information Reception and…

Read More

Small Devices Can Cause Big Problems: Improving Enterprise Mobile Device Security

Mobile phones—those mini-computers in our pockets—are a permanent fixture in today’s workplace. Managing and securing them is no simple task. Gema Howell, computer scientist and mobile device project lead at the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE), joined us for a recent Learning Series* webinar to discuss the challenges of enterprise mobile device security and privacy. She also shared tips for securing mobile devices. Below is a sneak…

Read More