NIST

In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity
Several macro-trends – such as growing digital transformation, rising hybrid work and, especially, booming AI adoption – have created an increasingly sophisticated threat landscape ...
Security Boulevard
A Closer Look at NIST’s Legacy Encryption Algorithm Transition Plans and Finalized PQC Algorithm Standards
Krupa Patil | | certificate lifecycle management, digital signature algorithm, NIST, PKI hierarchy, Post-quantum cryptography (PQC), PQC readiness, public-key cryptographic algorithms
NIST sets key deadlines for retiring legacy encryption algorithms, with widely-used methods like RSA, ECDSA, EdDSA, DH, and ECDH set for deprecation by 2030 and full phase-out by 2035. Last week, NIST ...

Chinese Research Using Quantum System to Crack Encryption a ‘Cautionary Tale’
Chinese researchers used a D-Wave quantum computer to crack a 22-bit encryption key, which can be used as a cautionary tale for what may lie ahead with future quantum systems but doesn't ...
Security Boulevard

Practical Advice for PQC Migration for TLS 1.3
Dr. Angelique Faye Loe | | certificate lifecycle management, crypto-agility, cryptographic solutions, cryptography, NIST, PKI, Post-Quantum Cryptography, PQC, quantum computing, TLS 1.3, TLS certificate, x.509 certificates
Numerous blogs and articles are urging security professionals to start migrating to quantum-resistant algorithms immediately. This urgency was heightened on August 13, 2024, when NIST finalized the FIPS 203 (ML-KEM), FIPS 204 ...

Kia Security Flaw Exposed, NIST’s New Password Guidelines
Tom Eston | | Authentication, biometrics, cars, Connected Cars, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Hacking, Information Security, Infosec, Kia, MFA, Multi-Factor Authentication, NIST, Password, password complexity, Password Guidelines, Password Policy, Password reset, Password Resets, passwords, Podcast, Podcasts, Privacy, security, technology, web application, web application vulnerability, Weekly Edition
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...
NIST Recommends Some Common-Sense Password Rules
NIST’s second draft of its “SP 800-63-4“—its digital identify guidelines—finally contains some really good rules about passwords: The following requirements apply to passwords: lVerifiers and CSPs SHALL require passwords to be a ...

Quantum Computing and the Risk to Classical Cryptography
Dr. Angelique Faye Loe | | Advanced Encryption Standard, certificate lifecycle management, crypto-agility, cryptography, NIST, PKI, PQC, quantum computing, SHA-1, SHA-2
The recent standardization of first three post-quantum cryptography (PQC) encryption and digital signature algorithms by the U.S. National Institute of Standards and Technology (NIST) has officially kicked off the race to PQC ...

ISO 27001 vs NIST: The Differences and How They Overlap
When you consider national and global cybersecurity, a handful of names stand out. Two of the largest are NIST and ISO/IEC. Both of these organizations have issued plenty of rulings and frameworks ...
NIST Releases First Post-Quantum Encryption Algorithms
Bruce Schneier | | cryptography, encryption, national security policy, NIST, quantum computing, security standards, Uncategorized
From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was ...

NIST Releases Post Quantum Cryptography Standards
The National Institute of Standards and Technology (NIST) released its first three post-quantum cryptography (PQC) standards, a world-first designed to meet the threat of powerful quantum computers as well as the increasing ...
Security Boulevard