The revised National Checklist Program for IT Products - Guidelines for Checklist Users and Developers, guidance from the National Institute of Standards and Technology, is now available. Officially ...
Widespread electronic attacks on computer systems have become commonplace with threats ranging from remotely launched attacks on network services to malicious code spread through e-mails. To make ...
To make it easier to measure the security of an information technology product or system, researchers at the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA ...
Officials at the National Institute of Standards and Technology hope their new publication will help simplify the process of setting security controls on Microsoft Corp.'s Windows XP Professional ...
Make sure your IT products are configured appropriately for your business environment using security configuration checklist recommendations provided by the National Institute of Standards and ...
Stephen D. Quinn, a senior computer scientist at the National Institute of Standards and Technology, is program manager of the interagency Information Security Automation Program and co-originator of ...
One of the best ways to strengthen IT security is to make sure all of the systems in an infrastructure conform to a set of security specifications. But that is often difficult and time-consuming. To ...
To make it easier to measure the security of an information technology product or system, researchers at the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA ...