The National Cybersecurity Center of Excellence (NCCoE) hosted a successful workshop, Protecting Consumer Data: Securing Payment and Transaction Information, on March 22 at the University of Alabama Birmingham. The day of conversation brought together more than 60 professionals from across the retail and payment ecosystem, including security technology vendors. The online webcast attracted more than 100 attendees.
The new Cybersecurity National Action Plan announced Tuesday by the White House aims at protecting federal agencies from cyberattacks, an urgent need dramatized by the ransacking of the Office of Personnel Management's aged computer systems by hackers two years ago.
Meanwhile, this month, the Commerce Department opened an expanded National Cybersecurity Center of Excellence, a public-private research and development partnership to bring together industry and government experts from NIST on high-priority cybersecurity challenges.
From the beginning of his Administration, the President has made it clear that cybersecurity is one of the most important challenges we face as a Nation, and for more than seven years he has acted comprehensively to confront that challenge. Working together with Congress, we took another step forward in this effort in December with the passage of the Cybersecurity Act of 2015, which provides important tools necessary to strengthen the Nation’s cybersecurity, particularly by making it easier for private companies to share cyber threat information with each other and the Government.
On February 8, 2016, the National Institute of Standards and Technology (NIST) hosted a ribbon cutting and building dedication ceremony for the National Cybersecurity Center of Excellence’s (NCCoE) new facility in Rockville, Md. Representing the public-private collaboration at the center, Commerce Secretary Penny Pritzker, Senator Barbara Mikulski, Senator Ben Cardin, Rep. John Delaney, Rep. John Sarbanes, Maryland Lt. Governor Boyd Rutherford, Montgomery County Executive Ike Leggett, and Under Secretary of Commerce for Standards and Technology and NIST Director Willie May participated in the ribbon cutting.
On Monday, Feb. 8, 2016, the National Cybersecurity Center of Excellence (NCCoE) will celebrate its move to expanded new facilities with a ribbon-cutting dedication and expert panel discussions featuring senior elected and government officials and the CEOs and presidents of several large companies.
The Center is a public-private partnership established by the Commerce Department’s National Institute of Standards and Technology in 2013.
Medical devices such as the infusion pumps that deliver medication intravenously were once standalone instruments that interacted only with the patient. Today, they have operating systems and communications hardware that allow them to connect to other devices and networks. While this technology has created more powerful tools and the potential for improved patient care, it also creates new safety and security risks.
Businesses face a near-constant threat of destructive malware, ransomware and malicious insider activities that can alter or destroy critical data. Even honest mistakes can alter data in ways that cause a significant loss to a company’s reputation, business operations and bottom line. To reduce this risk, organizations need to be able to recover quickly from a data integrity attack and trust the accuracy and precision of the recovered data.
The National Cybersecurity Center of Excellence (NCCoE) requests comments on a draft guide to help organizations better secure and manage their mobile devices.
The draft NIST Cybersecurity Practice Guide Mobile Device Security: Cloud & Hybrid Builds (Special Publication 1800-4) demonstrates how commercially available technologies can help companies secure sensitive data accessed by and/or stored on mobile devices used by employees.
Financial institutions can employ large numbers of people who use a variety of technology devices and applications across a wide geographic area. While these physical assets can be labeled and tracked using bar codes and databases, knowing what systems and applications are running on these devices is a much larger challenge. The inability to track the location and configuration of networked devices and software can leave an organization vulnerable to security threats.