BLOG

Join us at Configure Security Operations Using Microsoft Sentinel training day

Microsoft Security Virtual Training Day:Configure Security Operations Using Microsoft Sentinel   Build the skills you need to create new opportunities and accelerate your understanding of Microsoft Cloud technologies at a free Microsoft Security Virtual Training Day from Microsoft Learn. Join us at Configure Security Operations Using Microsoft Sentinel to learn best practices for hunting, detecting, … Continue reading Join us at Configure Security Operations Using Microsoft Sentinel training day
Tue, 16 Jul 2024 15:07:30 +0000

Strengthen your Zero Trust posture with a unified approach

  Stay ahead of modern threats with new unified solutions   Cybercriminals have embraced emerging technologies like AI as quickly as the rest of the world. In today’s rapidly evolving threat landscape, your Zero Trust strategy has become more essential than ever. In this blog, you’ll learn how to bolster your Zero Trust strategy with … Continue reading Strengthen your Zero Trust posture with a unified approach
Tue, 16 Jul 2024 12:54:05 +0000

NEW BLOG | Protecting Trained Models in Privacy-Preserving Federated Learning

This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK government’s Responsible Technology Adoption Unit (RTA), previously known as the Centre for Data Ethics and Innovation.  The last two posts in our series covered techniques for input privacy in privacy-preserving federated learning in the … Continue reading NEW BLOG | Protecting Trained Models in Privacy-Preserving Federated Learning
Tue, 16 Jul 2024 12:53:27 +0000

Personal Identity Verification (PIV) Interfaces, Cryptographic Algorithms, and Key Sizes: NIST Revises SP 800-73 and SP 800-78

In January 2022, NIST revised Federal Information Processing Standard (FIPS) 201, which establishes standards for the use of Personal Identity Verification (PIV) credentials, including those on PIV Cards. NIST Special Publication (SP) 800-73-5: Parts 1–3 and SP 800-78-5 have subsequently been revised to align with FIPS 201. SP 800-73-5: Parts 1–3 SP 800-73-5: Parts 1–3, … Continue reading Personal Identity Verification (PIV) Interfaces, Cryptographic Algorithms, and Key Sizes: NIST Revises SP 800-73 and SP 800-78
Tue, 16 Jul 2024 12:52:36 +0000

New Privacy-Preserving Federated Learning Blog Post

Dear Colleagues, ln the last two posts of our Privacy-Preserving Federated Learning (PPFL) blog series, we covered techniques for input privacy in PPFL in the context of horizontally and vertically partitioned data. However, to complete a PPFL system, these techniques must be combined with an approach for output privacy to limit what can be inferred … Continue reading New Privacy-Preserving Federated Learning Blog Post
Tue, 16 Jul 2024 12:51:06 +0000

Register for the Next NIST Small Business Cybersecurity Webinar: Ransomware Prevention, Detection, Response, and Recovery

Event Date: August 15, 2024 Event Time: 2:00PM – 3:00PM EDT Event Location: Virtual Description: Ransomware is a very serious and increasingly common threat to organizations of all sizes, and it is particularly devastating to smaller organizations that have limited resources. A successful ransomware attack can stop your business in its tracks. During this NIST … Continue reading Register for the Next NIST Small Business Cybersecurity Webinar: Ransomware Prevention, Detection, Response, and Recovery
Fri, 12 Jul 2024 16:51:01 +0000

NIST Workshop on Privacy-Enhancing Cryptography 2024

WPEC 2024, the NIST Workshop on Privacy-Enhancing Cryptography 2024, will bring together multiple perspectives of PEC stakeholders. The three-day virtual workshop is organized for sharing insights about PEC capabilities, use cases, real-world deployment, initiatives, challenges and opportunities, and the related context of privacy and auditability. The program will cover the following two themes: Read More
Fri, 12 Jul 2024 16:49:52 +0000

AT&T Discloses Breach of Customer Data

On July 12, AT&T released a public statement on unauthorized access of customer data from a third-party cloud platform. AT&T also provided recommendations and resources for affected customers.     CISA encourages customers to review the following AT&T article for additional information and follow necessary guidance to help protect personal information.  
Fri, 12 Jul 2024 16:48:16 +0000

Microsoft MVP program 16th Years


Wed, 10 Jul 2024 19:12:06 +0000

Expansion of US Renewable Energy Industry Increases Risk of Targeting by Malicious Cyber Actors

The Federal Bureau of Investigation (FBI) is releasing this Private Industry Notification (PIN) to highlight how malicious cyber actors may seek to disrupt power generating operations, steal intellectual property, or ransom information critical for normal functionality to advance geopolitical motives or financial gain within the United States renewable energy industry. With federal and local legislature … Continue reading Expansion of US Renewable Energy Industry Increases Risk of Targeting by Malicious Cyber Actors
Wed, 10 Jul 2024 19:07:11 +0000