#rss-bot | Logs for 2016-01-28
« return
[00:00:01] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[00:00:05] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[00:00:09] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[00:00:13] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[00:00:17] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[00:00:21] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[00:00:25] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[00:00:29] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[00:00:33] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[00:00:37] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[00:00:41] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[00:00:45] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[00:00:49] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[00:00:53] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[00:00:57] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[00:01:01] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[00:01:05] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[00:01:09] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[00:01:13] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[00:01:17] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[00:01:21] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[00:01:25] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[00:01:29] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[00:01:33] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[00:01:37] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[00:01:41] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[00:01:45] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[00:01:49] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[00:01:53] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[00:01:53] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:01:57] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[00:01:57] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[00:02:01] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[00:02:01] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[00:02:05] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[00:02:05] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[00:02:09] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[00:02:09] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[00:02:13] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[00:02:14] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[00:02:17] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[00:02:18] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[00:02:19] <Bender> [TheRegister] - Aereo TV boss is back ... pitching gigabit internet and a $350 Wi-Fi router - http://go.theregister.com
[00:02:21] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[00:02:21] <Bender> [SoylentNews] - Baidu Entering The Driverless Car Race - http://sylnt.us
[00:02:22] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[00:02:25] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[00:02:26] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[00:02:29] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[00:02:30] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[00:02:33] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[00:02:34] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[00:02:37] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[00:02:38] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[00:02:41] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[00:02:42] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[00:02:45] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[00:02:46] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[00:02:49] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[00:02:50] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[00:02:53] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[00:02:54] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[00:02:57] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[00:02:58] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[00:03:01] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[00:03:02] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[00:03:05] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[00:03:06] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:03:09] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[00:03:10] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[00:03:13] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[00:03:14] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[00:03:17] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[00:03:18] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[00:03:21] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[00:03:22] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[00:03:25] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[00:03:26] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[00:03:29] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[00:03:30] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[00:03:33] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[00:03:34] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[00:03:37] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[00:03:38] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[00:03:41] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[00:03:42] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:03:45] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[00:03:46] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[00:03:49] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[00:03:50] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[00:03:53] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[00:03:54] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[00:03:57] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[00:03:58] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[00:04:01] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[00:04:02] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[00:04:05] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[00:04:06] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[00:04:09] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[00:04:10] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[00:04:13] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[00:04:14] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[00:04:17] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[00:04:18] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[00:04:21] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[00:04:22] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[00:04:25] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[00:04:26] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[00:04:29] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[00:04:30] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[00:04:33] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[00:04:34] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[00:04:37] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[00:04:38] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[00:04:41] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[00:04:42] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[00:04:45] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[00:04:46] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[00:04:49] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[00:04:50] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[00:04:53] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[00:04:54] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[00:04:57] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[00:04:58] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[00:05:01] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[00:05:02] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[00:05:05] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[00:05:06] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[00:05:09] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[00:05:10] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[00:05:13] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[00:05:14] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[00:05:17] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[00:05:18] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[00:05:21] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[00:05:22] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[00:05:25] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[00:05:26] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[00:05:29] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[00:05:30] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[00:05:33] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[00:05:34] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[00:05:37] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[00:05:38] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[00:05:41] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[00:05:42] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[00:05:45] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[00:05:46] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[00:05:49] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[00:05:50] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[00:05:53] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[00:05:54] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[00:05:57] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[00:05:58] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[00:06:01] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[00:06:02] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[00:06:05] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[00:06:06] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[00:06:09] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[00:06:10] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[00:06:13] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[00:06:14] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[00:06:17] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[00:06:18] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[00:06:21] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[00:06:22] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[00:06:25] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[00:06:26] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[00:06:30] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[00:06:30] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[00:06:34] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[00:06:35] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[00:06:36] <Bender> [HackerNews] - Jade template language forced to rename to Pug - http://sylnt.us
[00:06:38] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[00:06:39] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[00:06:43] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[00:06:47] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[00:06:51] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[00:06:55] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[00:06:57] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[00:06:59] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[00:07:01] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[00:07:03] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[00:07:05] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[00:07:07] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[00:07:09] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[00:07:11] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[00:07:13] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[00:07:15] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[00:07:17] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[00:07:19] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[00:07:21] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[00:07:23] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[00:07:25] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[00:07:27] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[00:07:29] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[00:07:31] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[00:07:33] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[00:07:35] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[00:07:37] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[00:07:39] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[00:07:41] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[00:07:43] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[00:07:45] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[00:07:47] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[00:07:49] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[00:07:51] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[00:07:53] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[00:07:55] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[00:07:57] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[00:07:59] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[00:08:01] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[00:08:03] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[00:08:05] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[00:08:07] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[00:08:09] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[00:08:11] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[00:08:13] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[00:08:15] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[00:08:17] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[00:08:19] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[00:08:21] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[00:08:25] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[00:08:29] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[00:08:33] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[00:08:37] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[00:17:04] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[00:17:31] <Bender> [TheRegister] - Map of Tasmania to be shorn of electrical, data links to outside world - http://go.theregister.com
[00:21:47] <Bender> [HackerNews] - Facebook profit tops $1B; Revenue up 52% from Q4 2014 - http://www.wsj.com
[00:22:08] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[00:22:12] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[00:22:35] <Bender> [TheRegister] - This EMC is bereft of expansion, it is formerly increasing ... it is ex-growth - http://go.theregister.com
[00:27:12] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[00:31:55] <Bender> [HackerNews] - Paul Krugman Reviews ‘The Rise and Fall of American Growth’ by Robert J. Gordon - http://www.nytimes.com
[00:31:59] <Bender> [HackerNews] - GitHub is down - http://sylnt.us
[00:32:04] <Bender> [HackerNews] - GitHub Outage - http://sylnt.us
[00:32:16] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[00:36:59] <Bender> [HackerNews] - Ray Tracing in One Weekend - http://in1weekend.blogspot.com
[00:37:03] <Bender> [HackerNews] - GitHub Down? - http://sylnt.us
[00:42:03] <Bender> [HackerNews] - Aereo Founder Is Back with New High-Speed Wireless Service - http://www.wsj.com
[00:46:59] <Bender> [CNET] - Watch a guy invite deadly snakes to bite him -- to prove a point - CNET - http://feedproxy.google.com
[00:47:03] <Bender> [CNET] - Here's a hoverboard that 'probably' won't explode - CNET - http://feedproxy.google.com
[00:47:28] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[00:47:32] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[00:47:36] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[00:47:40] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[00:47:44] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[00:47:48] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[00:47:52] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[00:47:56] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[00:48:00] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[00:48:04] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[00:48:08] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[00:48:12] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[00:48:16] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[00:48:20] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[00:48:24] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[00:48:28] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[00:48:32] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[00:48:36] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[00:48:40] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[00:48:44] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[00:48:48] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[00:48:52] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[00:48:56] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[00:49:00] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[00:49:04] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[00:49:08] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[00:49:12] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[00:49:16] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[00:49:20] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[00:49:24] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[00:49:28] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[00:49:32] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[00:49:36] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[00:49:40] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[00:49:44] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[00:49:48] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[00:49:52] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[00:49:56] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[00:50:00] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[00:50:04] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[00:50:08] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[00:50:12] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[00:50:16] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[00:50:20] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[00:50:24] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[00:50:28] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[00:50:32] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[00:50:36] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[00:50:40] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[00:50:44] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[00:50:48] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[00:50:52] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[00:50:56] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[00:51:00] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[00:51:04] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[00:51:08] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[00:51:12] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[00:51:16] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[00:51:20] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[00:51:24] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[00:51:28] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[00:51:32] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[00:51:36] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[00:51:41] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[00:51:45] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[00:51:49] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[00:51:53] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[00:51:57] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[00:52:01] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[00:52:05] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[00:52:09] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[00:52:11] <Bender> [HackerNews] - SmartAsset is hiring a data engineer to build custom analytics/reporting tools - https://careers.jobscore.com
[00:52:13] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[00:52:15] <Bender> [HackerNews] - Spiders that have formed armies 50,000 strong - http://www.bbc.com
[00:52:17] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[00:52:21] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[00:52:25] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[00:52:29] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[00:52:31] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[00:52:33] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[00:52:35] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[00:52:37] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[00:52:39] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[00:52:41] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[00:52:43] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[00:52:45] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[00:52:48] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[00:52:49] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[00:52:52] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[00:52:53] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[00:52:56] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[00:52:57] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[00:53:00] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[00:53:01] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[00:53:04] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[00:53:05] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[00:53:08] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[00:53:09] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[00:53:12] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[00:53:13] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[00:53:16] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[00:53:17] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[00:53:20] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[00:53:21] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[00:53:24] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[00:53:25] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[00:53:28] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[00:53:29] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[00:53:32] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[00:53:33] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[00:53:36] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[00:53:37] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[00:53:40] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[00:53:41] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[00:53:44] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[00:53:45] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[00:53:48] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[00:53:49] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[00:53:52] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[00:53:53] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[00:53:56] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[00:53:57] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[00:54:00] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[00:54:01] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[00:54:04] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[00:54:05] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[00:54:08] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[00:54:09] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[00:54:12] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[00:54:13] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[00:54:16] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[00:54:17] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[00:54:20] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[00:54:21] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[00:54:24] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[00:54:25] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[00:54:28] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[00:54:29] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[00:54:32] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[00:54:33] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[00:54:36] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[00:54:37] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[00:54:40] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[00:54:41] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[00:54:44] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[00:54:45] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[00:54:48] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[00:54:49] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[00:54:52] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[00:54:53] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[00:54:56] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[00:54:57] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[00:55:00] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[00:55:01] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[00:55:04] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[00:55:05] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[00:55:08] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[00:55:09] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[00:55:12] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[00:55:13] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[00:55:16] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[00:55:17] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[00:55:20] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[00:55:21] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[00:55:24] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[00:55:25] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[00:55:28] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[00:55:29] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[00:55:32] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[00:55:33] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[00:55:36] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[00:55:37] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[00:55:40] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[00:55:41] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[00:55:44] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[00:55:45] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[00:55:48] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[00:55:49] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[00:55:52] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[00:55:53] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[00:55:56] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[00:55:58] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[00:56:00] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[00:56:02] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[00:56:04] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[00:56:06] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[00:56:08] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[00:56:10] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[00:56:12] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[00:56:14] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[00:56:16] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[00:56:18] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[00:56:20] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[00:56:22] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[00:56:24] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[00:56:26] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[00:56:28] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[00:56:30] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[00:56:32] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[00:56:34] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[00:56:36] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[00:56:38] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[00:56:40] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[00:56:42] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[00:56:44] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[00:56:46] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[00:56:49] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[00:56:50] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[00:56:53] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[00:56:54] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[00:56:57] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[00:56:58] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[00:57:01] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[00:57:01] <Bender> [BBCTech] - Samsung hit by slowing smartphone sales - http://www.bbc.co.uk
[00:57:02] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[00:57:05] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[00:57:06] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[00:57:09] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[00:57:10] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[00:57:13] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[00:57:13] <Bender> [ForbesTech] - Oculus Rift Can't Compete With PlayStation VR or HTC Vive, But Their Marketing Might... - http://www.forbes.com
[00:57:14] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[00:57:15] <Bender> [HackerNews] - The wisdom teeth industry is probably a scam - http://fusion.net
[00:57:17] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[00:57:18] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[00:57:22] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[00:57:26] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[00:57:30] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:57:34] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[00:57:36] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[00:57:38] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[00:57:40] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[00:57:42] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[00:57:44] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[00:57:46] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[00:57:48] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[00:57:50] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[00:57:52] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[00:57:54] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[00:57:56] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[00:57:58] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[00:58:00] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[00:58:02] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[00:58:04] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[00:58:06] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[00:58:08] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[00:58:10] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[00:58:12] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[00:58:14] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[00:58:16] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[00:58:18] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[00:58:20] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[00:58:22] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[00:58:24] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[00:58:26] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[00:58:28] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[00:58:30] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[00:58:32] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[00:58:34] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[00:58:36] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[00:58:38] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[00:58:40] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[00:58:42] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:58:44] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[00:58:46] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[00:58:48] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[00:58:50] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[00:58:52] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[00:58:54] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[00:58:56] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[00:58:58] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[00:59:00] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[00:59:02] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[00:59:04] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[00:59:06] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[00:59:08] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[00:59:10] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[00:59:12] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[00:59:14] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[00:59:16] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[00:59:18] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:59:22] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[00:59:26] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[00:59:30] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[00:59:34] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[00:59:38] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[00:59:42] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[00:59:46] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[00:59:50] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[00:59:54] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[00:59:58] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[01:00:02] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[01:00:06] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[01:00:10] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[01:00:14] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[01:00:18] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[01:00:22] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[01:00:27] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[01:00:31] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[01:00:35] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[01:00:39] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[01:00:43] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[01:00:47] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[01:00:51] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[01:00:55] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[01:00:59] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[01:01:03] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[01:01:07] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[01:01:11] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[01:01:15] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[01:01:19] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[01:01:23] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[01:01:27] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[01:01:31] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[01:01:35] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[01:01:39] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:01:43] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[01:01:47] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[01:01:51] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[01:01:55] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[01:01:59] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[01:02:02] <Bender> [ArsTechnica] - HTC Vive Pre impressions: A great VR system has only gotten better - http://arstechnica.com
[01:02:03] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[01:02:07] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[01:02:11] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[01:02:15] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[01:02:18] <Bender> [HackerNews] - Does America need to change how it elects its presidents? - http://www.bbc.co.uk
[01:02:19] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[01:02:22] <Bender> [HackerNews] - GitHub Experiencing Significant Network Disruption - https://twitter.com
[01:02:23] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[01:02:27] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[01:02:31] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[01:02:35] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[01:02:39] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[01:02:39] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:02:43] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[01:02:47] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[01:02:51] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[01:02:55] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[01:02:59] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[01:03:03] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[01:03:06] <Bender> [TheRegister] - GitHub falls offline, devs worldwide declare today a snow day - http://go.theregister.com
[01:03:08] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[01:03:12] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[01:03:16] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[01:03:20] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[01:03:24] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[01:03:28] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[01:03:32] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[01:03:36] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[01:03:40] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[01:03:44] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[01:03:48] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[01:03:52] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[01:03:56] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[01:07:14] <Bender> [CNET] - I watched live from my first grade class as Challenger exploded - CNET - http://feedproxy.google.com
[01:07:22] <Bender> [HackerNews] - Show HN: WinMerge for synching SQL Servers to version-controlled scripts - http://servantt.com
[01:07:26] <Bender> [HackerNews] - Visualizing Concurrency in Go - https://divan.github.io
[01:07:30] <Bender> [HackerNews] - Facebook Climbs to 1.59B Users, Beats Q4 Estimates with $5.8B Revenue - http://techcrunch.com
[01:12:26] <Bender> [HackerNews] - California Police Used Stingrays in Planes to Spy on Phones - http://www.wired.com
[01:12:47] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[01:12:51] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[01:17:30] <Bender> [HackerNews] - Sheryl Sandberg Is Wrong: Silicon Valley Wants MBAs - http://tapwage.com
[01:17:34] <Bender> [HackerNews] - The Startups Hiding in UBS, Citigroup and Barclays - http://www.bloomberg.com
[01:17:51] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[01:22:28] <Bender> [ComputerWorld] - As video surges, Facebook eyes a dedicated service - http://rss.computerworld.com
[01:22:34] <Bender> [HackerNews] - GitHub is down - http://sylnt.us
[01:22:54] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[01:27:30] <Bender> [CNET] - Samsung still smarting from phone slump - CNET - http://feedproxy.google.com
[01:27:34] <Bender> [CNET] - Swimming with drones > dancing with wolves (Tomorrow Daily 305 show notes) - CNET - http://feedproxy.google.com
[01:27:38] <Bender> [CNET] - I watched live from my first-grade class as Challenger exploded - CNET - http://feedproxy.google.com
[01:32:44] <Bender> [ITWorld] - Samsung profit plummets on weak smartphone sales - http://www.itworld.com
[01:33:30] <Bender> [SoylentNews] - Microsoft Releases CNTK, its Open Source Deep Learning Toolkit, on GitHub - http://sylnt.us
[01:37:39] <Bender> [ComputerWorld] - Samsung profit plummets on sagging smartphone sales - http://rss.computerworld.com
[01:37:45] <Bender> [HackerNews] - Frozen Poop Pills Fight Life-Threatening Infections - http://www.npr.org
[01:37:49] <Bender> [HackerNews] - Query Sniper - https://corner.squareup.com
[01:37:53] <Bender> [HackerNews] - How does Twitter feel about Bernie, Hillary, and trump? - http://candidatetwittertracker.com
[01:39:49] <Bender> [WiredScience] - Federal Regulators Say a Theranos Lab Has Serious Problems - http://feeds.wired.com
[01:42:48] <Bender> [ForbesTech] - The Best Upcoming Indie PC And Video Game Releases Of February (2016) - http://www.forbes.com
[01:42:52] <Bender> [ForbesTech] - EA Sacrifices E3 Expo Power To Focus On Gamers With Standalone Event - http://www.forbes.com
[01:43:11] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[01:43:15] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[01:43:19] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[01:43:23] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[01:43:27] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[01:43:31] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[01:43:35] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[01:43:39] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[01:43:43] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[01:43:47] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[01:43:51] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[01:43:55] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[01:43:59] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[01:44:03] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[01:44:07] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[01:44:11] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[01:44:15] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[01:44:19] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[01:44:23] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[01:44:27] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[01:44:31] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[01:44:35] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[01:44:39] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[01:44:43] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[01:44:47] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[01:44:51] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[01:44:55] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[01:44:59] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[01:45:03] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[01:45:07] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[01:45:11] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[01:45:15] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[01:45:19] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[01:45:23] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[01:45:27] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[01:45:31] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[01:45:35] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[01:45:39] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[01:45:43] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[01:45:47] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[01:45:51] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[01:45:55] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[01:45:59] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[01:46:03] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[01:46:07] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[01:46:11] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[01:46:15] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[01:46:19] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[01:46:24] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[01:46:28] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[01:46:32] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[01:46:36] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[01:46:40] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[01:46:44] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[01:46:48] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[01:46:52] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[01:46:56] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[01:47:00] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[01:47:04] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[01:47:08] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[01:47:12] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[01:47:16] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[01:47:20] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[01:47:24] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[01:47:28] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[01:47:32] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[01:47:36] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[01:47:37] <Bender> [ArsTechnica] - Oracle deprecates the Java browser plugin, prepares for its demise - http://arstechnica.com
[01:47:40] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[01:47:44] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[01:47:48] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[01:47:52] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[01:47:53] <Bender> [HackerNews] - DeLoreans Coming Back to Production - http://money.cnn.com
[01:47:56] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[01:48:00] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[01:48:04] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[01:48:08] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[01:48:12] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[01:48:14] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[01:48:16] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[01:48:18] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[01:48:20] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[01:48:22] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[01:48:24] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[01:48:26] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[01:48:28] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[01:48:30] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[01:48:32] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[01:48:34] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[01:48:36] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[01:48:38] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[01:48:40] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[01:48:40] <Bender> [TheRegister] - Oracle to kill off Java browser plugins with JDK 9 - http://go.theregister.com
[01:48:42] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[01:48:44] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[01:48:46] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[01:48:48] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[01:48:50] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[01:48:52] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[01:48:54] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[01:48:56] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[01:48:58] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[01:49:00] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[01:49:02] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[01:49:04] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[01:49:06] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[01:49:08] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[01:49:10] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[01:49:12] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[01:49:14] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[01:49:16] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[01:49:18] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[01:49:20] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[01:49:22] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[01:49:24] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[01:49:26] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[01:49:28] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[01:49:30] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[01:49:32] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[01:49:34] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[01:49:36] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[01:49:38] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[01:49:40] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[01:49:42] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[01:49:44] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[01:49:46] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[01:49:48] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[01:49:50] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[01:49:52] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[01:49:54] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[01:49:56] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[01:49:58] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[01:50:00] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[01:50:02] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[01:50:04] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[01:50:06] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[01:50:08] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[01:50:10] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[01:50:12] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[01:50:14] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[01:50:16] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[01:50:18] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[01:50:20] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[01:50:22] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[01:50:24] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[01:50:26] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[01:50:28] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[01:50:30] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[01:50:32] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[01:50:34] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[01:50:36] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[01:50:38] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[01:50:40] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[01:50:42] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[01:50:44] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[01:50:46] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[01:50:48] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[01:50:50] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[01:50:52] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[01:50:54] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[01:50:57] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[01:50:58] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[01:51:01] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[01:51:02] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[01:51:05] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[01:51:06] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[01:51:09] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[01:51:10] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[01:51:13] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[01:51:14] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[01:51:17] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[01:51:18] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[01:51:21] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[01:51:22] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[01:51:25] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[01:51:26] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[01:51:29] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[01:51:31] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[01:51:33] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[01:51:35] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[01:51:37] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[01:51:39] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[01:51:41] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[01:51:43] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[01:51:45] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[01:51:47] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[01:51:49] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[01:51:51] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[01:51:53] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[01:51:55] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[01:51:57] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[01:51:59] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[01:52:01] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[01:52:03] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[01:52:05] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[01:52:07] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[01:52:09] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[01:52:11] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[01:52:13] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[01:52:15] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[01:52:17] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[01:52:19] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[01:52:21] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[01:52:23] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[01:52:25] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[01:52:27] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[01:52:29] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[01:52:31] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[01:52:33] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[01:52:35] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[01:52:37] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[01:52:39] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[01:52:41] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[01:52:43] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[01:52:45] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[01:52:47] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[01:52:49] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[01:52:51] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[01:52:53] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[01:52:55] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[01:52:57] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[01:52:57] <Bender> [HackerNews] - Distro Astro – Linux Distribution for Astronomy - http://www.distroastro.org
[01:52:59] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[01:52:59] <Bender> [ITWorld] - Outlook for iOS gets a calendar widget as Sunrise's sunset looms - http://www.itworld.com
[01:53:01] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[01:53:05] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[01:53:09] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[01:53:13] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:53:17] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[01:53:21] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[01:53:25] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[01:53:29] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[01:53:33] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[01:53:37] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[01:53:41] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[01:53:45] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[01:53:49] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[01:53:53] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[01:53:57] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[01:54:01] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[01:54:05] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[01:54:09] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[01:54:13] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[01:54:17] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[01:54:21] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[01:54:25] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:54:29] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[01:54:33] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[01:54:37] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[01:54:41] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[01:54:45] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[01:54:49] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[01:54:53] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[01:54:57] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[01:55:01] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:55:05] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[01:55:09] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[01:55:13] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[01:55:17] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[01:55:21] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[01:55:26] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[01:55:30] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[01:55:34] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[01:55:38] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[01:55:42] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[01:55:46] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[01:55:50] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[01:55:54] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[01:55:58] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[01:56:02] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[01:56:06] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[01:56:10] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[01:56:14] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[01:56:18] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[01:56:22] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[01:56:26] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[01:56:30] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[01:56:34] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[01:56:38] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[01:56:42] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[01:56:46] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[01:56:50] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[01:56:54] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[01:56:58] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[01:57:02] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[01:57:06] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[01:57:10] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[01:57:14] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[01:57:18] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[01:57:22] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:57:26] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[01:57:30] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[01:57:34] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[01:57:38] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[01:57:42] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[01:57:46] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[01:57:50] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[01:57:54] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[01:57:58] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[01:58:01] <Bender> [HackerNews] - Not just Flint: Poor communities across the country live with extreme polluters - https://www.washingtonpost.com
[01:58:02] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[01:58:06] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[01:58:10] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[01:58:14] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[01:58:18] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[01:58:22] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[01:58:22] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:58:26] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[01:58:26] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[01:58:30] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[01:58:30] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[01:58:34] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[01:58:34] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[01:58:38] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[01:58:38] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[01:58:42] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[01:58:42] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[01:58:46] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[01:58:46] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[01:58:50] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[01:58:50] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[01:58:54] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[01:58:54] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[01:58:58] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[01:58:58] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[01:59:02] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[01:59:02] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[01:59:06] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[01:59:06] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[01:59:10] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[01:59:10] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[01:59:14] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[01:59:14] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[01:59:18] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[01:59:18] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[01:59:22] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[01:59:22] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[01:59:26] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[01:59:26] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[01:59:30] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[01:59:30] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[01:59:34] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[01:59:34] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[01:59:38] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[01:59:38] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[01:59:42] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[01:59:46] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[01:59:50] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[01:59:54] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[01:59:58] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[02:00:02] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[02:03:05] <Bender> [HackerNews] - YC-backed cannabis tech company hiring front end devs in Bay Area - https://angel.co
[02:03:25] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[02:03:29] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[02:03:33] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[02:03:52] <Bender> [TheRegister] - Windows Mobile users suffer backup super-slurp as Redmond forgets Wi-Fi switch - http://go.theregister.com
[02:08:08] <Bender> [HackerNews] - Go 1.6 Release Candidate 1 is released - https://groups.google.com!topic/golang-nuts/4iqU__h7skQ
[02:08:31] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[02:13:33] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[02:18:08] <Bender> [CNET] - Unions charge T-Mobile with shady business practices - CNET - http://feedproxy.google.com
[02:18:14] <Bender> [ForbesTech] - Mark Zuckerberg Becomes World's Sixth Richest Person As Facebook Shares Soar - http://www.forbes.com
[02:18:38] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[02:18:42] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[02:18:46] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[02:18:50] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[02:18:54] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[02:18:58] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[02:19:02] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[02:19:03] <Bender> [TheRegister] - Israeli academics claim they can predict botnet attacks - http://go.theregister.com
[02:19:06] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[02:19:10] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[02:19:14] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[02:19:18] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[02:19:22] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[02:19:26] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[02:19:30] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[02:19:34] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[02:19:38] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[02:19:42] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[02:19:46] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[02:19:50] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[02:19:54] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[02:19:58] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[02:20:02] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[02:20:06] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[02:20:10] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[02:20:14] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[02:20:18] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[02:20:22] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[02:20:26] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[02:20:30] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[02:20:34] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[02:20:38] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[02:20:42] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[02:20:46] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[02:20:50] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[02:20:54] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[02:20:58] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[02:21:02] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[02:21:06] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[02:21:10] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[02:21:14] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[02:21:18] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[02:21:22] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[02:21:27] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[02:21:31] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[02:21:35] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[02:21:39] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[02:21:43] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[02:21:47] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[02:21:51] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[02:21:55] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[02:21:59] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[02:22:03] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[02:22:07] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[02:22:11] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[02:22:15] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[02:22:19] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[02:22:23] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[02:22:27] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[02:22:31] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[02:22:35] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[02:22:39] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[02:22:43] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[02:22:47] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[02:22:51] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[02:22:55] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[02:22:59] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[02:23:03] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[02:23:07] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[02:23:11] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[02:23:15] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[02:23:19] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[02:23:20] <Bender> [HackerNews] - The Economist: Glamorous tech startups can be brutal places for workers - http://www.economist.com
[02:23:23] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[02:23:27] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[02:23:31] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[02:23:35] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[02:23:39] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[02:23:41] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[02:23:43] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[02:23:45] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[02:23:47] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[02:23:49] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[02:23:51] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[02:23:53] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[02:23:55] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[02:23:57] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[02:23:59] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[02:24:01] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[02:24:03] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[02:24:05] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[02:24:07] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[02:24:09] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[02:24:11] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[02:24:13] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[02:24:15] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[02:24:17] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[02:24:19] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[02:24:21] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[02:24:23] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[02:24:25] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[02:24:27] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[02:24:29] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[02:24:31] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[02:24:33] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[02:24:35] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[02:24:37] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[02:24:39] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[02:24:41] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[02:24:43] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[02:24:45] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[02:24:47] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[02:24:49] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[02:24:51] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[02:24:53] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[02:24:55] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[02:24:57] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[02:24:59] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[02:25:01] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[02:25:03] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[02:25:05] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[02:25:07] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[02:25:09] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[02:25:11] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[02:25:13] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[02:25:15] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[02:25:17] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[02:25:19] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[02:25:21] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[02:25:23] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[02:25:25] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[02:25:27] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[02:25:29] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[02:25:31] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[02:25:33] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[02:25:35] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[02:25:37] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[02:25:39] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[02:25:41] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[02:25:43] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[02:25:45] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[02:25:47] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[02:25:49] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[02:25:52] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[02:25:53] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[02:25:56] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[02:25:57] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[02:26:00] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[02:26:01] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[02:26:04] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[02:26:05] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[02:26:08] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[02:26:09] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[02:26:12] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[02:26:13] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[02:26:16] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[02:26:17] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[02:26:20] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[02:26:21] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[02:26:24] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[02:26:25] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[02:26:28] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[02:26:29] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[02:26:32] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[02:26:33] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[02:26:36] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[02:26:37] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[02:26:40] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[02:26:41] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[02:26:44] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[02:26:45] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[02:26:48] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[02:26:49] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[02:26:52] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[02:26:54] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[02:26:56] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[02:26:58] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[02:27:00] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[02:27:02] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[02:27:04] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[02:27:06] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[02:27:08] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[02:27:10] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[02:27:12] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[02:27:14] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[02:27:16] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[02:27:18] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[02:27:20] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[02:27:22] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[02:27:24] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[02:27:26] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[02:27:28] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[02:27:30] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[02:27:32] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[02:27:34] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[02:27:36] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[02:27:38] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[02:27:40] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[02:27:42] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[02:27:44] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[02:27:46] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[02:27:48] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[02:27:50] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[02:27:52] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[02:27:54] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[02:27:56] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[02:27:58] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[02:28:00] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[02:28:02] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[02:28:04] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[02:28:06] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[02:28:08] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[02:28:10] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[02:28:10] <Bender> [BBCTech] - Keeping football tough but safe - http://www.bbc.co.uk
[02:28:12] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[02:28:14] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[02:28:16] <Bender> [CNET] - Smartphone shipments said to have banner year in 2015 - CNET - http://feedproxy.google.com
[02:28:16] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[02:28:18] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[02:28:20] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[02:28:22] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[02:28:24] <Bender> [HackerNews] - Boxful - https://www.boxful.com
[02:28:24] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[02:28:26] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[02:28:28] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[02:28:32] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[02:28:36] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[02:28:40] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[02:28:44] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[02:28:45] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[02:28:49] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[02:28:49] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[02:28:53] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[02:28:53] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[02:28:57] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[02:28:57] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[02:29:01] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[02:29:01] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[02:29:05] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[02:29:05] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[02:29:09] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[02:29:09] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[02:29:13] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[02:29:13] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[02:29:17] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[02:29:17] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[02:29:21] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[02:29:21] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[02:29:25] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[02:29:25] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[02:29:29] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[02:29:29] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[02:29:33] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[02:29:33] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[02:29:37] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[02:29:37] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[02:29:41] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[02:29:41] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[02:29:45] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[02:29:45] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[02:29:49] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[02:29:49] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[02:29:53] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[02:29:53] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[02:29:57] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[02:29:57] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[02:30:01] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[02:30:01] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[02:30:05] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[02:30:05] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[02:30:09] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[02:30:09] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[02:30:13] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[02:30:13] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[02:30:17] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[02:30:17] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[02:30:21] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[02:30:21] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[02:30:25] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[02:30:25] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[02:30:29] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[02:30:33] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[02:30:37] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[02:30:41] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[02:30:45] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[02:30:49] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[02:30:53] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[02:30:57] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[02:31:01] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[02:31:05] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[02:31:09] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[02:31:13] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[02:31:17] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[02:31:21] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[02:31:25] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[02:31:29] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[02:31:33] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[02:31:37] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[02:31:41] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[02:31:45] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[02:31:49] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[02:31:53] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[02:31:57] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[02:32:01] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[02:32:05] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[02:32:09] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[02:32:13] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[02:32:17] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[02:32:21] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[02:32:25] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[02:32:29] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[02:32:33] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[02:32:37] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[02:32:41] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[02:32:45] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[02:32:49] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[02:32:53] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[02:32:57] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[02:33:01] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[02:33:06] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[02:33:10] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[02:33:14] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[02:33:18] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[02:33:22] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[02:33:26] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[02:33:28] <Bender> [HackerNews] - Hardware, Less Hard - http://www.themacro.com
[02:33:30] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[02:33:30] <Bender> [ITWorld] - Apple is in a position to overtake Samsung as world's top chip buyer - http://www.itworld.com
[02:33:34] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[02:33:38] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[02:33:42] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[02:33:46] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[02:33:50] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[02:33:54] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[02:33:58] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[02:34:02] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[02:34:06] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[02:34:10] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[02:34:14] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[02:34:18] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[02:34:22] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[02:34:26] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[02:34:30] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[02:34:34] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[02:34:38] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[02:34:42] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[02:34:46] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[02:34:50] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[02:34:54] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[02:34:58] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[02:35:02] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[02:35:06] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[02:38:32] <Bender> [HackerNews] - A Long Game - http://techcrunch.com
[02:38:52] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[02:38:56] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[02:39:00] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[02:39:19] <Bender> [TheRegister] - Sony slurps Altair Semiconductor to make 'things' sing - http://go.theregister.com
[02:43:34] <Bender> [ForbesTech] - Microsoft's Biggest Hits And Flops - http://www.forbes.com
[02:43:38] <Bender> [ITWorld] - Verizon is building for the Super Bowl and staying for the boom - http://www.itworld.com
[02:43:38] <Bender> [ForbesTech] - When 'Free' Windows 10 Becomes Expensive, You Should Fear This - http://www.forbes.com
[02:43:42] <Bender> [ForbesTech] - In Pictures: iPhone 6s vs Galaxy S6 - http://www.forbes.com
[02:43:46] <Bender> [ForbesTech] - Galaxy S7 Leak '100% Confirms' 5 Brilliant New Features - http://www.forbes.com
[02:43:55] Bytram|away is now known as Bytram
[02:44:03] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[02:48:31] <Bender> [CNET] - Watch a guy let deadly snakes bite him to prove a point - CNET - http://feedproxy.google.com
[02:48:39] <Bender> [HackerNews] - Chrome Cleanup Tool - https://www.google.com
[02:53:43] <Bender> [HackerNews] - YC-backed cannabis tech company hiring front-end devs in Bay Area - https://angel.co
[02:54:04] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[03:03:51] <Bender> [HackerNews] - Removing support for Emacs unexec from Glibc - http://lwn.net
[03:04:40] <Bender> [SoylentNews] - "My Little Pony" Sued for Using a Pirated Font - TorrentFreak - http://sylnt.us
[03:08:55] <Bender> [HackerNews] - How Following Others Will Leave You Broke - http://calmscience.net
[03:11:21] -!- richardboegliAFK [richardboegliAFK!~r@180-32-566-585.dyn.iinet.net.au] has joined #rss-bot
[03:14:20] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[03:14:24] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[03:14:28] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[03:14:32] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[03:14:36] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[03:14:40] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[03:14:44] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[03:14:48] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[03:14:52] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[03:14:56] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[03:14:57] -!- richardboegli has quit [Ping timeout: 268 seconds]
[03:15:00] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[03:15:04] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[03:15:08] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[03:15:12] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[03:15:16] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[03:15:20] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[03:15:24] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[03:15:28] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[03:15:32] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[03:15:36] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[03:15:40] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[03:15:44] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[03:15:48] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[03:15:52] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[03:15:56] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[03:16:00] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[03:16:04] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[03:16:08] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[03:16:12] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[03:16:16] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[03:16:20] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[03:16:24] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[03:16:28] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[03:16:32] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[03:16:36] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[03:16:40] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[03:16:44] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[03:16:48] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[03:16:52] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[03:16:56] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[03:17:00] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[03:17:04] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[03:17:08] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[03:17:12] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[03:17:16] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[03:17:20] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[03:17:24] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[03:17:28] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[03:17:32] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[03:17:36] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[03:17:40] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[03:17:44] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[03:17:48] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[03:17:52] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[03:17:56] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[03:18:00] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[03:18:04] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[03:18:08] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[03:18:12] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[03:18:16] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[03:18:20] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[03:18:24] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[03:18:29] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[03:18:33] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[03:18:37] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[03:18:41] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[03:18:45] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[03:18:49] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[03:18:53] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[03:18:57] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[03:19:01] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[03:19:01] <Bender> [ForbesTech] - Grammys Evolve: Recording Academy Taps YouTuber Connor Franta As New Member, Twitter Correspondent - http://www.forbes.com
[03:19:03] <Bender> [HackerNews] - FaceBook, PayPal and EBay’s Q1 Earnings Reports - http://techcrunch.com
[03:19:05] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[03:19:05] <Bender> [ForbesTech] - Galaxy S7 Leak Confirms 5 Brilliant New Features - http://www.forbes.com
[03:19:09] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[03:19:13] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[03:19:17] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[03:19:21] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[03:19:24] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[03:19:25] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[03:19:28] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[03:19:29] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[03:19:32] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[03:19:33] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[03:19:36] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[03:19:37] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[03:19:40] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[03:19:41] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[03:19:44] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[03:19:45] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[03:19:48] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[03:19:49] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[03:19:52] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[03:19:53] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[03:19:56] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[03:19:57] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[03:20:00] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[03:20:01] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[03:20:04] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[03:20:05] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[03:20:08] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[03:20:09] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[03:20:12] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[03:20:13] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[03:20:16] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[03:20:17] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[03:20:20] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[03:20:21] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[03:20:24] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[03:20:25] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[03:20:28] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[03:20:29] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[03:20:32] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[03:20:33] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[03:20:36] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[03:20:37] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[03:20:40] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[03:20:41] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[03:20:44] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[03:20:45] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[03:20:48] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[03:20:49] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[03:20:52] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[03:20:53] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[03:20:56] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[03:20:57] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[03:21:00] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[03:21:01] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[03:21:04] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[03:21:05] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[03:21:08] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[03:21:09] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[03:21:12] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[03:21:13] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[03:21:16] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[03:21:17] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[03:21:20] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[03:21:21] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[03:21:24] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[03:21:25] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[03:21:28] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[03:21:29] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[03:21:32] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[03:21:33] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[03:21:36] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[03:21:37] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[03:21:40] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[03:21:41] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[03:21:44] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[03:21:45] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[03:21:48] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[03:21:49] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[03:21:52] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[03:21:53] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[03:21:56] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[03:21:57] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[03:22:00] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[03:22:01] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[03:22:04] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[03:22:05] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[03:22:08] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[03:22:09] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[03:22:12] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[03:22:13] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[03:22:16] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[03:22:17] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[03:22:20] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[03:22:21] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[03:22:24] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[03:22:25] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[03:22:28] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[03:22:29] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[03:22:32] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[03:22:33] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[03:22:36] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[03:22:37] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[03:22:40] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[03:22:41] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[03:22:44] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[03:22:45] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[03:22:48] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[03:22:49] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[03:22:52] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[03:22:54] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[03:22:56] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[03:22:58] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[03:23:00] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[03:23:02] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[03:23:04] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[03:23:06] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[03:23:08] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[03:23:10] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[03:23:12] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[03:23:14] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[03:23:17] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[03:23:18] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[03:23:21] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[03:23:22] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[03:23:25] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[03:23:26] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[03:23:29] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[03:23:30] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[03:23:33] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[03:23:34] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[03:23:37] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[03:23:38] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[03:23:41] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[03:23:42] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[03:23:45] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[03:23:46] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[03:23:49] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[03:23:50] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[03:23:53] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[03:23:54] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[03:23:57] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[03:23:58] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[03:24:01] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[03:24:02] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[03:24:05] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[03:24:06] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[03:24:09] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[03:24:10] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[03:24:14] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[03:24:18] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[03:24:22] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[03:24:26] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[03:24:30] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[03:24:34] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[03:24:38] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[03:24:42] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[03:24:46] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[03:24:50] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[03:24:54] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[03:24:58] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[03:25:02] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[03:25:06] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[03:25:10] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[03:25:14] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[03:25:18] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[03:25:22] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[03:25:26] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[03:25:30] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[03:25:34] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[03:25:38] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[03:25:42] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[03:25:46] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[03:25:50] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[03:25:54] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[03:25:58] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[03:26:02] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[03:26:06] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[03:26:10] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[03:26:14] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[03:26:18] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[03:26:22] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[03:26:26] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[03:26:30] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[03:26:34] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[03:26:38] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[03:26:42] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[03:26:46] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[03:26:50] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[03:26:54] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[03:26:58] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[03:27:02] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[03:27:06] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[03:27:11] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[03:27:15] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[03:27:19] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[03:27:23] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[03:27:27] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[03:27:31] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[03:27:35] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[03:27:39] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[03:27:43] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[03:27:47] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[03:27:51] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[03:27:55] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[03:27:59] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[03:28:03] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[03:28:07] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[03:28:11] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[03:28:15] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[03:28:19] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[03:28:23] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[03:28:27] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[03:28:31] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[03:28:35] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[03:28:39] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[03:28:43] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[03:28:47] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[03:28:51] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[03:28:55] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[03:28:59] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[03:29:03] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[03:29:07] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[03:29:11] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[03:29:15] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[03:29:19] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[03:29:23] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[03:29:27] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[03:29:31] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[03:29:31] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[03:29:35] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[03:29:35] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[03:29:39] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[03:29:39] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[03:29:43] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[03:29:43] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[03:29:47] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[03:29:47] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[03:29:51] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[03:29:51] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[03:29:55] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[03:29:55] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[03:29:59] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[03:29:59] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[03:30:03] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[03:30:03] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[03:30:07] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[03:30:07] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[03:30:11] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[03:30:11] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[03:30:15] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[03:30:15] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[03:30:19] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[03:30:19] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[03:30:23] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[03:30:23] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[03:30:27] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[03:30:27] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[03:30:31] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[03:30:32] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[03:30:35] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[03:30:36] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[03:30:39] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[03:30:40] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[03:30:43] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[03:30:44] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[03:30:47] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[03:30:48] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[03:30:52] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[03:30:56] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[03:31:00] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[03:31:04] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[03:31:08] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[03:31:12] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[03:34:35] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[03:34:39] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[03:34:43] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[03:39:19] <Bender> [HackerNews] - Power laws as a thinking tool - https://www.facebook.com
[03:44:43] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[03:49:47] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[03:50:17] <Bender> [TheRegister] - Juniper turns around in 2015, worried about 2016 - http://go.theregister.com
[04:04:38] <Bender> [HackerNews] - Scientists open the ‘black box’ of schizophrenia with dramatic genetic discovery - https://www.washingtonpost.com
[04:10:19] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[04:10:23] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[04:10:28] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[04:10:29] <Bender> [TheRegister] - NSA’s top hacking boss explains how to protect your network from his attack squads - http://go.theregister.com
[04:10:32] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[04:10:36] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[04:10:40] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[04:10:44] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[04:10:48] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[04:10:52] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[04:10:56] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[04:11:00] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[04:11:04] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[04:11:08] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[04:11:12] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[04:11:16] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[04:11:20] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[04:11:24] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[04:11:28] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[04:11:32] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[04:11:36] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[04:11:40] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[04:11:44] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[04:11:48] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[04:11:52] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[04:11:56] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[04:12:00] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[04:12:04] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[04:12:08] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[04:12:12] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[04:12:16] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[04:12:20] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[04:12:24] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[04:12:28] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[04:12:32] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[04:12:36] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[04:12:40] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[04:12:44] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[04:12:48] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[04:12:52] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[04:12:56] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[04:13:00] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[04:13:04] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[04:13:08] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[04:13:12] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[04:13:16] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[04:13:20] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[04:13:24] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[04:13:28] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[04:13:32] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[04:13:36] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[04:13:40] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[04:13:44] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[04:13:48] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[04:13:52] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[04:13:56] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[04:14:00] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[04:14:04] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[04:14:08] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[04:14:12] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[04:14:16] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[04:14:20] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[04:14:24] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[04:14:28] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[04:14:32] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[04:14:36] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[04:14:41] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[04:14:45] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[04:14:45] <Bender> [HackerNews] - Data Privacy Day: Take Charge of Your Family’s Privacy - https://www.eff.org
[04:14:49] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[04:14:53] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[04:14:57] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[04:15:01] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[04:15:05] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[04:15:07] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[04:15:09] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[04:15:11] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[04:15:13] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[04:15:15] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[04:15:17] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[04:15:19] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[04:15:21] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[04:15:24] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[04:15:25] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[04:15:28] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[04:15:29] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[04:15:32] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[04:15:33] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[04:15:36] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[04:15:37] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[04:15:40] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[04:15:41] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[04:15:44] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[04:15:45] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[04:15:48] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[04:15:49] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[04:15:52] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[04:15:53] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[04:15:56] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[04:15:57] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[04:16:00] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[04:16:01] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[04:16:04] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[04:16:05] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[04:16:08] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[04:16:09] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[04:16:12] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[04:16:13] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[04:16:16] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[04:16:17] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[04:16:20] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[04:16:21] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[04:16:24] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[04:16:25] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[04:16:28] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[04:16:29] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[04:16:32] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[04:16:33] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[04:16:36] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[04:16:37] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[04:16:40] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[04:16:41] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[04:16:44] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[04:16:45] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[04:16:48] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[04:16:49] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[04:16:52] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[04:16:53] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[04:16:56] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[04:16:57] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[04:17:00] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[04:17:01] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[04:17:04] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[04:17:05] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[04:17:08] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[04:17:09] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[04:17:12] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[04:17:13] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[04:17:16] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[04:17:17] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[04:17:20] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[04:17:21] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[04:17:24] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[04:17:25] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[04:17:28] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[04:17:29] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[04:17:32] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[04:17:33] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[04:17:36] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[04:17:37] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[04:17:40] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[04:17:41] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[04:17:44] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[04:17:45] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[04:17:48] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[04:17:49] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[04:17:52] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[04:17:53] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[04:17:56] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[04:17:57] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[04:18:00] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[04:18:01] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[04:18:04] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[04:18:05] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[04:18:08] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[04:18:09] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[04:18:12] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[04:18:13] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[04:18:16] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[04:18:17] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[04:18:20] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[04:18:21] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[04:18:24] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[04:18:25] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[04:18:28] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[04:18:29] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[04:18:32] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[04:18:33] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[04:18:36] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[04:18:37] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[04:18:40] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[04:18:41] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[04:18:44] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[04:18:45] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[04:18:48] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[04:18:49] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[04:18:52] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[04:18:53] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[04:18:56] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[04:18:57] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[04:19:00] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[04:19:01] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[04:19:04] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[04:19:06] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[04:19:08] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[04:19:10] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[04:19:12] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[04:19:14] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[04:19:16] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[04:19:18] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[04:19:20] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[04:19:22] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[04:19:24] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[04:19:26] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[04:19:28] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[04:19:30] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[04:19:32] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[04:19:34] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[04:19:36] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[04:19:38] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[04:19:40] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[04:19:42] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[04:19:44] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[04:19:46] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[04:19:49] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[04:19:49] <Bender> [HackerNews] - 25 Civil Liberties Orgs Call for Open Hearings on Section 702 Surveillance - https://www.eff.org
[04:19:50] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[04:19:53] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[04:19:54] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[04:19:58] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[04:20:02] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[04:20:06] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[04:20:10] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[04:20:14] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[04:20:18] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[04:20:22] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:20:26] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[04:20:30] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[04:20:34] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[04:20:38] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[04:20:42] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[04:20:46] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[04:20:50] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[04:20:54] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[04:20:58] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[04:21:02] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[04:21:06] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[04:21:10] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[04:21:14] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[04:21:18] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[04:21:22] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[04:21:26] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[04:21:30] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[04:21:34] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:21:38] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[04:21:42] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[04:21:46] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[04:21:50] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[04:21:54] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[04:21:58] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[04:22:02] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[04:22:06] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[04:22:10] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:22:14] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[04:22:18] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[04:22:22] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[04:22:26] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[04:22:30] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[04:22:34] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[04:22:38] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[04:22:42] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[04:22:46] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[04:22:50] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[04:22:55] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[04:22:59] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[04:23:03] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[04:23:07] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[04:23:11] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[04:23:15] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[04:23:19] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[04:23:23] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[04:23:27] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[04:23:31] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[04:23:35] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[04:23:39] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[04:23:43] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[04:23:47] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[04:23:51] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[04:23:55] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[04:23:59] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[04:24:03] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[04:24:07] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[04:24:11] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[04:24:15] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[04:24:19] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[04:24:23] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[04:24:27] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[04:24:31] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[04:24:35] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[04:24:39] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[04:24:43] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[04:24:47] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[04:24:51] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[04:24:55] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[04:24:59] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[04:25:03] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[04:25:07] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[04:25:11] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[04:25:14] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[04:25:15] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[04:25:18] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[04:25:19] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[04:25:22] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[04:25:23] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[04:25:26] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[04:25:27] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[04:25:30] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[04:25:31] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[04:25:34] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[04:25:35] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[04:25:38] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[04:25:39] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[04:25:42] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[04:25:43] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[04:25:46] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[04:25:47] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[04:25:50] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[04:25:51] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[04:25:54] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[04:25:55] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[04:25:58] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[04:25:59] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[04:26:02] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[04:26:03] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[04:26:06] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[04:26:07] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[04:26:10] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[04:26:11] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[04:26:14] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[04:26:15] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[04:26:18] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[04:26:19] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[04:26:22] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[04:26:23] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[04:26:26] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[04:26:27] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[04:26:30] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[04:26:31] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[04:26:34] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[04:26:35] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[04:26:38] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[04:26:39] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[04:26:42] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[04:26:43] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[04:26:46] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[04:26:47] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[04:26:50] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[04:26:54] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[04:30:18] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[04:30:22] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[04:30:26] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[04:35:22] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[04:35:50] <Bender> [SoylentNews] - Prank Website Causes Safari to Crash and Forces iPhones and iPads to Reboot - http://sylnt.us
[04:40:07] <Bender> [ITWorld] - Google's VirusTotal now picks out suspicious firmware - http://www.itworld.com
[04:40:26] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[04:40:30] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[04:40:34] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[04:40:38] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[04:40:42] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[04:40:46] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[04:40:51] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[04:40:55] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[04:40:59] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[04:41:03] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[04:41:07] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[04:41:11] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[04:41:15] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[04:41:19] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[04:41:23] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[04:41:27] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[04:41:31] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[04:41:35] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[04:41:39] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[04:41:43] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[04:41:47] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[04:41:51] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[04:41:55] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[04:41:59] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[04:42:03] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[04:42:07] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[04:42:11] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[04:42:15] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[04:42:19] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[04:42:23] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[04:42:27] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[04:42:31] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[04:42:35] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[04:42:39] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[04:42:43] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[04:42:47] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[04:42:51] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[04:42:55] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[04:42:59] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[04:43:03] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[04:43:07] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[04:43:11] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[04:43:15] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[04:43:19] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[04:43:23] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[04:43:27] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[04:43:31] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[04:43:35] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[04:43:39] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[04:43:43] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[04:43:47] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[04:43:51] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[04:43:55] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[04:43:59] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[04:44:03] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[04:44:07] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[04:44:11] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[04:44:15] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[04:44:19] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[04:44:23] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[04:44:27] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[04:44:31] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[04:44:35] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[04:44:39] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[04:44:43] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[04:44:48] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[04:44:52] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[04:44:56] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[04:45:00] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[04:45:04] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[04:45:08] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[04:45:12] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[04:45:16] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[04:45:20] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[04:45:24] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[04:45:28] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[04:45:29] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[04:45:32] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[04:45:33] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[04:45:36] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[04:45:37] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[04:45:40] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[04:45:41] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[04:45:44] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[04:45:45] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[04:45:48] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[04:45:49] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[04:45:52] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[04:45:53] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[04:45:56] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[04:45:57] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[04:46:00] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[04:46:01] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[04:46:04] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[04:46:05] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[04:46:08] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[04:46:09] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[04:46:12] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[04:46:13] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[04:46:16] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[04:46:17] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[04:46:20] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[04:46:22] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[04:46:24] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[04:46:26] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[04:46:28] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[04:46:30] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[04:46:32] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[04:46:34] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[04:46:36] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[04:46:38] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[04:46:40] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[04:46:42] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[04:46:44] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[04:46:46] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[04:46:48] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[04:46:50] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[04:46:52] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[04:46:54] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[04:46:56] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[04:46:58] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[04:47:00] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[04:47:02] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[04:47:04] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[04:47:06] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[04:47:08] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[04:47:10] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[04:47:12] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[04:47:14] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[04:47:16] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[04:47:18] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[04:47:20] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[04:47:22] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[04:47:24] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[04:47:26] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[04:47:28] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[04:47:30] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[04:47:32] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[04:47:34] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[04:47:36] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[04:47:38] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[04:47:40] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[04:47:42] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[04:47:44] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[04:47:46] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[04:47:48] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[04:47:50] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[04:47:52] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[04:47:54] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[04:47:56] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[04:47:58] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[04:48:00] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[04:48:02] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[04:48:04] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[04:48:06] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[04:48:08] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[04:48:10] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[04:48:12] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[04:48:14] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[04:48:16] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[04:48:18] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[04:48:20] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[04:48:22] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[04:48:24] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[04:48:26] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[04:48:28] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[04:48:30] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[04:48:32] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[04:48:34] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[04:48:36] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[04:48:38] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[04:48:40] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[04:48:42] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[04:48:44] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[04:48:46] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[04:48:48] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[04:48:50] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[04:48:52] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[04:48:54] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[04:48:57] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[04:48:58] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[04:49:01] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[04:49:02] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[04:49:05] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[04:49:06] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[04:49:09] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[04:49:10] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[04:49:13] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[04:49:14] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[04:49:17] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[04:49:18] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[04:49:21] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[04:49:22] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[04:49:25] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[04:49:26] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[04:49:29] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[04:49:30] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[04:49:33] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[04:49:34] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[04:49:37] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[04:49:38] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[04:49:41] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[04:49:42] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[04:49:45] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[04:49:46] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[04:49:49] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[04:49:50] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[04:49:53] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[04:49:54] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[04:49:57] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[04:49:58] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[04:50:01] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[04:50:02] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[04:50:05] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[04:50:06] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[04:50:09] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[04:50:10] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[04:50:12] <Bender> [HackerNews] - Overpass Web Front from Redhat - http://overpassfont.org
[04:50:13] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[04:50:14] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[04:50:17] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[04:50:21] <Bender> [MITTech] - NSA Hacking Chief: Internet of Things Security Keeps Me Up at Night - http://www.technologyreview.com
[04:50:21] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[04:50:25] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[04:50:29] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[04:50:33] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:50:37] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[04:50:41] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[04:50:45] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[04:50:49] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[04:50:53] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[04:50:57] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[04:51:01] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[04:51:05] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[04:51:09] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[04:51:13] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[04:51:17] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[04:51:21] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[04:51:25] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[04:51:29] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[04:51:33] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[04:51:37] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[04:51:41] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[04:51:45] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:51:49] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[04:51:53] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[04:51:57] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[04:52:01] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[04:52:05] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[04:52:09] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[04:52:13] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[04:52:17] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[04:52:21] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:52:25] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[04:52:29] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[04:52:33] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[04:52:37] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[04:52:41] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[04:52:45] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[04:52:49] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[04:52:53] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[04:52:57] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[04:53:01] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[04:53:05] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[04:53:09] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[04:53:13] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[04:53:17] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[04:53:21] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[04:53:25] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[04:53:29] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[04:53:34] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[04:53:38] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[04:53:42] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[04:53:46] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[04:53:50] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[04:53:54] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[04:53:58] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[04:54:02] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[04:54:06] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[04:54:10] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[04:54:14] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[04:54:18] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[04:54:22] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[04:54:26] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[04:54:30] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[04:54:34] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[04:54:38] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[04:54:42] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[04:54:46] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[04:54:50] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[04:54:54] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[04:54:58] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[04:55:02] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[04:55:06] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[04:55:10] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[04:55:14] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[04:55:18] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[04:55:22] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[04:55:26] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[04:55:30] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[04:55:34] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[04:55:37] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[04:55:38] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[04:55:41] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[04:55:42] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[04:55:45] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[04:55:46] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[04:55:49] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[04:55:50] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[04:55:53] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[04:55:54] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[04:55:57] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[04:55:58] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[04:56:01] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[04:56:02] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[04:56:05] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[04:56:06] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[04:56:09] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[04:56:10] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[04:56:13] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[04:56:14] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[04:56:17] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[04:56:18] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[04:56:21] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[04:56:22] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[04:56:25] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[04:56:26] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[04:56:29] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[04:56:30] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[04:56:33] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[04:56:34] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[04:56:37] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[04:56:38] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[04:56:41] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[04:56:42] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[04:56:45] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[04:56:46] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[04:56:49] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[04:56:50] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[04:56:53] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[04:56:54] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[04:56:57] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[04:56:58] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[04:57:01] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[04:57:05] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[04:57:09] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[04:57:13] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[04:57:17] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[05:00:20] <Bender> [HackerNews] - The anatomy of an ssh session - http://necrux.com
[05:00:56] <Bender> [PhysOrg] - Daughters of interracial parents more likely than sons to identify as multiracial - http://phys.org
[05:01:08] <Bender> [TheRegister] - 'Critical' Israel power grid attack was just boring ransomware - http://go.theregister.com
[05:05:24] <Bender> [HackerNews] - Cops hate encryption but the NSA loves it when you use PGP - http://www.theregister.co.uk
[05:05:28] <Bender> [HackerNews] - Overpass Web Front from Red Hat - http://overpassfont.org
[05:05:45] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[05:05:49] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[05:05:53] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[05:06:06] <Bender> [SecurityWeek] - LeChiffre Ransomware Hits Indian Banks, Pharma Company - http://feedproxy.google.com
[05:06:13] <Bender> [SoylentNews] - Github Struggling with Network Outage; Appears to have Recovered - http://sylnt.us
[05:07:15] Bytram is now known as Bytram|away
[05:10:30] <Bender> [ITWorld] - Smartphone growth at lowest on concerns about global economy, saturation in China - http://www.itworld.com
[05:10:49] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[05:15:53] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[05:15:57] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[05:16:01] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[05:16:05] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[05:16:09] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[05:16:13] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[05:16:17] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[05:16:21] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[05:16:25] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[05:16:29] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[05:16:33] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[05:16:37] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[05:16:41] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[05:16:45] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[05:16:49] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[05:16:53] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[05:16:57] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[05:17:01] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[05:17:05] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[05:17:09] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[05:17:13] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[05:17:17] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[05:17:21] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[05:17:25] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[05:17:29] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[05:17:33] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[05:17:37] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[05:17:41] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[05:17:45] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[05:17:49] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[05:17:53] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[05:17:57] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[05:18:01] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[05:18:05] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[05:18:09] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[05:18:13] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[05:18:17] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[05:18:21] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[05:18:25] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[05:18:29] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[05:18:33] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[05:18:37] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[05:18:41] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[05:18:45] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[05:18:49] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[05:18:53] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[05:18:57] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[05:19:01] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[05:19:05] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[05:19:09] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[05:19:13] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[05:19:17] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[05:19:21] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[05:19:26] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[05:19:30] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[05:19:34] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[05:19:38] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[05:19:42] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[05:19:46] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[05:19:50] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[05:19:54] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[05:19:58] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[05:20:02] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[05:20:06] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[05:20:10] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[05:20:14] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[05:20:18] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[05:20:22] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[05:20:26] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[05:20:30] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[05:20:34] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[05:20:34] <Bender> [ForbesTech] - Cloud, Mobile, And Big Data Analytics Drive Latest Rounds of Megadeals - http://www.forbes.com
[05:20:38] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[05:20:42] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[05:20:46] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[05:20:50] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[05:20:54] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[05:20:56] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[05:20:58] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[05:21:00] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[05:21:02] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[05:21:04] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[05:21:06] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[05:21:08] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[05:21:10] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[05:21:12] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[05:21:14] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[05:21:16] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[05:21:18] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[05:21:20] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[05:21:22] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[05:21:24] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[05:21:26] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[05:21:28] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[05:21:30] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[05:21:32] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[05:21:34] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[05:21:36] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[05:21:38] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[05:21:40] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[05:21:42] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[05:21:44] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[05:21:46] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[05:21:48] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[05:21:50] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[05:21:52] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[05:21:54] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[05:21:56] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[05:21:58] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[05:22:00] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[05:22:02] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[05:22:05] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[05:22:06] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[05:22:09] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[05:22:10] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[05:22:13] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[05:22:14] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[05:22:17] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[05:22:18] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[05:22:21] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[05:22:22] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[05:22:25] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[05:22:26] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[05:22:29] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[05:22:30] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[05:22:33] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[05:22:34] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[05:22:37] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[05:22:38] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[05:22:41] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[05:22:42] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[05:22:45] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[05:22:46] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[05:22:49] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[05:22:50] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[05:22:53] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[05:22:54] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[05:22:57] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[05:22:58] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[05:23:01] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[05:23:02] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[05:23:05] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[05:23:06] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[05:23:09] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[05:23:10] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[05:23:13] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[05:23:14] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[05:23:17] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[05:23:18] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[05:23:21] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[05:23:22] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[05:23:25] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[05:23:26] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[05:23:29] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[05:23:30] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[05:23:33] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[05:23:35] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[05:23:37] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[05:23:39] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[05:23:41] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[05:23:43] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[05:23:45] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[05:23:47] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[05:23:49] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[05:23:51] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[05:23:53] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[05:23:55] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[05:23:57] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[05:23:59] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[05:24:01] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[05:24:03] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[05:24:05] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[05:24:07] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[05:24:09] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[05:24:11] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[05:24:13] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[05:24:15] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[05:24:17] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[05:24:19] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[05:24:21] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[05:24:23] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[05:24:25] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[05:24:27] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[05:24:29] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[05:24:31] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[05:24:33] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[05:24:35] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[05:24:37] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[05:24:39] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[05:24:41] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[05:24:43] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[05:24:45] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[05:24:47] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[05:24:49] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[05:24:51] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[05:24:53] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[05:24:55] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[05:24:57] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[05:24:59] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[05:25:01] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[05:25:03] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[05:25:05] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[05:25:07] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[05:25:09] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[05:25:11] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[05:25:13] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[05:25:15] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[05:25:17] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[05:25:19] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[05:25:21] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[05:25:23] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[05:25:25] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[05:25:27] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[05:25:29] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[05:25:31] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[05:25:33] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[05:25:35] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[05:25:37] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[05:25:39] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[05:25:41] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[05:25:43] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[05:25:47] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[05:25:51] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[05:25:55] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[05:25:59] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[05:26:00] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[05:26:03] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[05:26:04] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[05:26:07] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[05:26:08] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[05:26:11] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[05:26:12] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[05:26:15] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[05:26:16] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[05:26:19] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[05:26:20] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[05:26:23] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[05:26:24] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[05:26:27] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[05:26:28] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[05:26:31] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[05:26:32] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[05:26:35] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[05:26:36] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[05:26:39] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[05:26:40] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[05:26:43] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[05:26:44] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[05:26:47] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[05:26:48] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[05:26:51] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[05:26:52] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[05:26:55] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[05:26:56] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[05:26:59] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[05:27:00] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[05:27:03] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[05:27:04] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[05:27:07] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[05:27:08] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[05:27:11] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[05:27:12] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[05:27:15] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[05:27:16] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[05:27:19] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[05:27:20] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[05:27:23] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[05:27:24] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[05:27:27] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[05:27:28] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[05:27:31] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[05:27:32] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[05:27:35] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[05:27:36] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[05:27:39] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[05:27:41] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[05:27:43] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[05:27:47] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[05:27:51] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[05:27:55] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[05:27:59] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[05:28:03] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[05:28:07] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[05:28:12] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[05:28:16] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[05:28:20] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[05:28:24] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[05:28:28] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[05:28:32] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[05:28:36] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[05:28:40] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[05:28:44] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[05:28:48] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[05:28:52] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[05:28:56] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[05:29:00] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[05:29:04] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[05:29:08] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[05:29:12] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[05:29:16] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[05:29:20] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[05:29:24] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[05:29:28] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[05:29:32] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[05:29:36] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[05:29:40] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[05:29:44] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[05:29:48] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[05:29:52] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[05:29:56] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[05:30:00] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[05:30:04] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[05:30:08] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[05:30:12] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[05:30:16] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[05:30:20] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[05:30:24] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[05:30:28] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[05:30:32] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[05:30:36] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[05:30:40] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[05:30:44] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[05:30:48] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[05:30:52] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[05:30:56] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[05:31:00] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[05:31:04] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[05:31:05] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[05:31:08] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[05:31:09] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[05:31:12] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[05:31:13] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[05:31:16] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[05:31:20] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[05:31:24] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[05:31:29] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[05:31:33] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[05:31:37] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[05:31:41] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[05:31:45] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[05:31:49] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[05:31:53] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[05:31:57] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[05:32:01] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[05:32:05] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[05:32:09] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[05:32:13] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[05:32:17] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[05:32:21] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[05:32:25] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[05:36:08] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[05:36:29] <Bender> [SecurityWeek] - What is the Real Cost of "Good Enough" Security? - http://feedproxy.google.com
[05:36:33] <Bender> [SecurityWeek] - Samsung Patches Critical Vulnerabilities in Android Devices - http://feedproxy.google.com
[05:36:34] <Bender> [TheRegister] - Angler exploit kit now hooking execs with Xmas Flash hole - http://go.theregister.com
[05:40:51] <Bender> [HackerNews] - Build the Future Faster PlanGrid (YC W12) as a PM, Designer or Engineer - http://www.plangrid.com
[05:45:55] <Bender> [HackerNews] - America's Sudden U-Turn on Highway Fonts - http://www.citylab.com
[05:45:59] <Bender> [HackerNews] - Newegg sues patent troll that dropped its case - http://arstechnica.com
[05:46:03] <Bender> [HackerNews] - Build the Future Faster at PlanGrid (YC W12) as a PM, Designer or Engineer - http://www.plangrid.com
[05:46:16] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[05:50:57] <Bender> [ForbesTech] - Arrow Season 4 - http://www.forbes.com
[05:50:59] <Bender> [HackerNews] - Head of Navy intelligence hasn't been allowed to see military secrets for years - https://www.washingtonpost.com
[05:51:01] <Bender> [ForbesTech] - 'Arrow' Season 4, Episode 11 Review: A.W.O.L. - http://www.forbes.com
[06:01:54] <Bender> [TheRegister] - CableLabs certifies first gigabit-class cable modems - http://go.theregister.com
[06:06:11] <Bender> [HackerNews] - To prevent back pain orthotics are out exercise is in - http://well.blogs.nytimes.com
[06:06:15] <Bender> [HackerNews] - Mobile Video Player SDK Written in Swift - http://sylnt.us
[06:11:35] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[06:11:39] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[06:11:43] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[06:11:47] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[06:11:51] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[06:11:55] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[06:11:59] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[06:12:03] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[06:12:07] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[06:12:11] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[06:12:15] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[06:12:19] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[06:12:23] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[06:12:27] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[06:12:31] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[06:12:35] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[06:12:39] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[06:12:43] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[06:12:48] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[06:12:52] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[06:12:56] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[06:13:00] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[06:13:04] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[06:13:08] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[06:13:12] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[06:13:16] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[06:13:20] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[06:13:24] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[06:13:28] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[06:13:32] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[06:13:36] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[06:13:40] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[06:13:44] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[06:13:48] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[06:13:52] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[06:13:56] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[06:14:00] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[06:14:04] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[06:14:08] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[06:14:12] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[06:14:16] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[06:14:20] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[06:14:24] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[06:14:28] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[06:14:32] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[06:14:36] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[06:14:40] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[06:14:44] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[06:14:48] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[06:14:52] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[06:14:56] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[06:15:00] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[06:15:04] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[06:15:08] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[06:15:12] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[06:15:16] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[06:15:20] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[06:15:24] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[06:15:28] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[06:15:32] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[06:15:36] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[06:15:40] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[06:15:44] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[06:15:48] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[06:15:52] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[06:15:56] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[06:16:00] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[06:16:04] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[06:16:08] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[06:16:12] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[06:16:16] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[06:16:18] <Bender> [HackerNews] - Facebook enters transport business with Uber - http://www.bbc.com
[06:16:20] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[06:16:22] <Bender> [HackerNews] - Automation potential and wages for US jobs - https://public.tableau.com!/vizhome/AutomationandUSjobs/Technicalpotentialforautomation
[06:16:24] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[06:16:26] <Bender> [HackerNews] - Ask HN: What should replace XMPP? - https://news.ycombinator.com
[06:16:28] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[06:16:32] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[06:16:36] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[06:16:39] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[06:16:41] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[06:16:43] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[06:16:45] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[06:16:47] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[06:16:49] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[06:16:51] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[06:16:53] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[06:16:55] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[06:16:57] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[06:16:59] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[06:17:01] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[06:17:03] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[06:17:05] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[06:17:07] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[06:17:09] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[06:17:11] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[06:17:13] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[06:17:15] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[06:17:17] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[06:17:19] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[06:17:21] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[06:17:23] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[06:17:25] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[06:17:27] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[06:17:29] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[06:17:31] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[06:17:33] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[06:17:35] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[06:17:37] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[06:17:39] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[06:17:41] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[06:17:43] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[06:17:45] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[06:17:47] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[06:17:49] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[06:17:51] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[06:17:53] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[06:17:55] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[06:17:57] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[06:17:59] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[06:18:01] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[06:18:03] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[06:18:05] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[06:18:07] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[06:18:09] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[06:18:11] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[06:18:13] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[06:18:15] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[06:18:17] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[06:18:19] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[06:18:21] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[06:18:23] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[06:18:25] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[06:18:27] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[06:18:29] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[06:18:31] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[06:18:33] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[06:18:35] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[06:18:37] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[06:18:39] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[06:18:41] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[06:18:43] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[06:18:45] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[06:18:47] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[06:18:49] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[06:18:51] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[06:18:53] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[06:18:55] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[06:18:57] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[06:18:59] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[06:19:01] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[06:19:03] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[06:19:05] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[06:19:07] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[06:19:09] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[06:19:11] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[06:19:13] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[06:19:15] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[06:19:17] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[06:19:19] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[06:19:21] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[06:19:23] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[06:19:25] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[06:19:27] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[06:19:29] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[06:19:32] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[06:19:33] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[06:19:36] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[06:19:37] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[06:19:40] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[06:19:41] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[06:19:44] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[06:19:45] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[06:19:48] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[06:19:49] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[06:19:52] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[06:19:53] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[06:19:56] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[06:19:57] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[06:20:00] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[06:20:01] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[06:20:04] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[06:20:05] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[06:20:08] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[06:20:09] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[06:20:12] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[06:20:13] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[06:20:16] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[06:20:17] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[06:20:20] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[06:20:21] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[06:20:24] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[06:20:25] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[06:20:28] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[06:20:29] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[06:20:32] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[06:20:33] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[06:20:36] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[06:20:38] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[06:20:40] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[06:20:42] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[06:20:44] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[06:20:46] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[06:20:48] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[06:20:50] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[06:20:52] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[06:20:54] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[06:20:56] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[06:20:58] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[06:21:00] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[06:21:02] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[06:21:04] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[06:21:06] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[06:21:08] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[06:21:10] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[06:21:12] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[06:21:14] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[06:21:16] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[06:21:18] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[06:21:20] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[06:21:22] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[06:21:22] <Bender> [HackerNews] - The Useless Agony of Going Offline - http://www.newyorker.com
[06:21:24] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[06:21:26] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[06:21:30] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[06:21:34] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[06:21:38] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:21:42] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[06:21:43] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[06:21:46] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[06:21:47] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[06:21:50] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[06:21:51] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[06:21:54] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[06:21:55] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[06:21:58] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[06:21:59] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[06:22:02] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[06:22:03] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[06:22:06] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[06:22:07] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[06:22:10] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[06:22:11] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[06:22:14] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[06:22:15] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[06:22:18] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[06:22:19] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[06:22:22] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[06:22:23] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[06:22:26] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[06:22:27] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[06:22:30] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[06:22:31] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[06:22:34] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[06:22:35] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[06:22:38] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[06:22:39] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[06:22:42] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[06:22:43] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[06:22:46] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[06:22:47] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[06:22:50] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:22:51] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[06:22:54] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[06:22:55] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[06:22:58] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[06:22:59] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[06:23:02] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[06:23:03] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[06:23:06] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[06:23:07] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[06:23:10] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[06:23:11] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[06:23:14] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[06:23:15] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[06:23:18] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[06:23:19] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[06:23:22] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[06:23:23] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[06:23:26] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:23:30] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[06:23:34] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[06:23:38] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[06:23:42] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[06:23:46] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[06:23:50] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[06:23:54] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[06:23:58] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[06:24:02] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[06:24:06] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[06:24:10] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[06:24:14] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[06:24:18] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[06:24:22] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[06:24:26] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[06:24:30] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[06:24:34] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[06:24:38] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[06:24:42] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[06:24:46] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[06:24:50] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[06:24:54] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[06:24:58] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[06:25:02] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[06:25:06] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[06:25:11] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[06:25:15] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[06:25:19] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[06:25:23] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[06:25:27] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[06:25:31] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[06:25:35] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[06:25:39] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[06:25:43] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[06:25:47] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[06:25:51] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[06:25:55] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[06:25:59] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[06:26:03] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[06:26:07] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[06:26:11] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[06:26:15] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[06:26:19] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[06:26:23] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[06:26:24] <Bender> [ForbesTech] - Six Steps To Adapt To The Future Of Work - http://www.forbes.com
[06:26:27] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[06:26:31] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[06:26:35] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[06:26:39] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[06:26:43] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[06:26:47] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[06:26:47] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[06:26:51] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[06:26:51] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[06:26:55] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[06:26:55] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[06:26:59] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[06:27:03] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[06:27:07] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[06:27:11] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[06:27:15] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[06:27:19] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[06:27:23] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[06:27:27] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[06:27:31] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[06:27:35] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[06:27:39] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[06:27:43] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[06:27:47] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[06:27:51] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[06:27:55] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[06:27:59] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[06:28:03] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[06:36:54] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[06:37:21] <Bender> [TheRegister] - TalkTalk CuffCuffs ScamScam CrimCrims - http://go.theregister.com
[06:37:22] <Bender> [SoylentNews] - The Aliens are Silent Because They're Dead - http://sylnt.us
[06:41:38] <Bender> [HackerNews] - GrabTaxi Rebrands to Grab, Launches Cashless Payments and Corporate Service - http://techcrunch.com
[06:41:58] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[06:46:40] <Bender> [ForbesTech] - Highlights from StartmeupHK Venture Forum with Elon Musk: Why Hong Kong Is Great for Entrepreneurs - http://www.forbes.com
[06:46:41] <Bender> [HackerNews] - How can you help Flint? Don't send bottled water - http://michaelmoore.com
[06:46:45] <Bender> [HackerNews] - To Prevent Back Pain, Orthotics Are Out, Exercise Is In - http://well.blogs.nytimes.com
[06:47:02] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[06:47:06] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[06:47:10] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[06:47:14] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[06:47:18] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[06:47:22] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[06:47:26] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[06:47:30] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[06:47:34] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[06:47:38] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[06:47:42] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[06:47:46] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[06:47:50] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[06:47:54] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[06:47:59] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[06:48:03] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[06:48:07] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[06:48:11] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[06:48:15] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[06:48:19] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[06:48:23] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[06:48:27] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[06:48:31] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[06:48:35] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[06:48:39] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[06:48:43] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[06:48:47] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[06:48:51] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[06:48:55] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[06:48:59] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[06:49:03] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[06:49:07] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[06:49:11] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[06:49:15] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[06:49:19] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[06:49:23] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[06:49:27] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[06:49:31] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[06:49:35] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[06:49:39] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[06:49:43] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[06:49:47] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[06:49:51] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[06:49:55] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[06:49:59] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[06:50:03] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[06:50:07] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[06:50:11] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[06:50:15] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[06:50:19] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[06:50:23] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[06:50:27] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[06:50:31] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[06:50:35] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[06:50:39] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[06:50:43] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[06:50:47] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[06:50:51] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[06:50:55] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[06:50:59] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[06:51:03] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[06:51:07] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[06:51:11] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[06:51:15] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[06:51:19] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[06:51:23] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[06:51:27] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[06:51:31] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[06:51:35] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[06:51:39] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[06:51:43] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[06:51:45] <Bender> [HackerNews] - The Killer Mobile Device for Victorian Women (2013) - http://www.collectorsweekly.com
[06:51:47] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[06:51:51] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[06:51:55] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[06:51:59] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[06:52:03] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[06:52:06] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[06:52:08] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[06:52:10] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[06:52:12] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[06:52:14] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[06:52:16] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[06:52:18] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[06:52:20] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[06:52:22] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[06:52:24] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[06:52:26] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[06:52:28] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[06:52:30] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[06:52:32] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[06:52:34] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[06:52:36] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[06:52:38] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[06:52:40] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[06:52:42] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[06:52:44] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[06:52:46] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[06:52:48] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[06:52:50] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[06:52:52] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[06:52:54] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[06:52:56] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[06:52:58] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[06:53:00] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[06:53:02] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[06:53:04] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[06:53:06] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[06:53:08] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[06:53:10] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[06:53:12] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[06:53:14] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[06:53:16] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[06:53:18] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[06:53:20] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[06:53:22] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[06:53:24] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[06:53:26] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[06:53:28] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[06:53:30] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[06:53:32] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[06:53:34] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[06:53:36] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[06:53:38] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[06:53:40] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[06:53:42] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[06:53:44] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[06:53:46] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[06:53:48] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[06:53:50] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[06:53:52] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[06:53:54] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[06:53:56] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[06:53:58] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[06:54:00] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[06:54:02] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[06:54:04] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[06:54:06] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[06:54:08] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[06:54:10] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[06:54:12] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[06:54:14] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[06:54:16] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[06:54:18] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[06:54:20] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[06:54:22] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[06:54:24] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[06:54:26] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[06:54:28] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[06:54:30] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[06:54:32] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[06:54:34] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[06:54:36] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[06:54:38] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[06:54:40] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[06:54:42] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[06:54:44] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[06:54:46] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[06:54:48] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[06:54:50] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[06:54:52] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[06:54:55] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[06:54:56] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[06:54:59] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[06:55:00] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[06:55:03] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[06:55:04] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[06:55:07] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[06:55:08] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[06:55:11] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[06:55:12] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[06:55:15] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[06:55:16] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[06:55:19] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[06:55:20] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[06:55:23] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[06:55:24] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[06:55:27] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[06:55:28] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[06:55:31] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[06:55:32] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[06:55:35] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[06:55:36] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[06:55:39] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[06:55:40] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[06:55:43] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[06:55:44] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[06:55:47] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[06:55:48] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[06:55:51] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[06:55:52] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[06:55:55] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[06:55:56] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[06:55:59] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[06:56:00] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[06:56:03] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[06:56:04] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[06:56:07] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[06:56:08] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[06:56:11] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[06:56:12] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[06:56:15] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[06:56:16] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[06:56:19] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[06:56:20] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[06:56:23] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[06:56:24] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[06:56:27] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[06:56:28] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[06:56:31] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[06:56:33] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[06:56:35] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[06:56:37] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[06:56:39] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[06:56:41] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[06:56:43] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[06:56:45] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[06:56:47] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[06:56:49] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[06:56:49] <Bender> [HackerNews] - Don’t believe quotation websites - http://www.decisionsciencenews.com
[06:56:51] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[06:56:53] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[06:56:57] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[06:57:01] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[06:57:05] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:57:09] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[06:57:13] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[06:57:17] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[06:57:21] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[06:57:25] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[06:57:29] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[06:57:33] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[06:57:37] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[06:57:41] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[06:57:45] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[06:57:49] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[06:57:53] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[06:57:57] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[06:58:01] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[06:58:05] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[06:58:09] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[06:58:13] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[06:58:17] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:58:21] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[06:58:25] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[06:58:29] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[06:58:33] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[06:58:37] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[06:58:41] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[06:58:45] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[06:58:49] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[06:58:53] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:58:57] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[06:59:01] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[06:59:05] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[06:59:09] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[06:59:13] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[06:59:17] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[06:59:21] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[06:59:25] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[06:59:29] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[06:59:33] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[06:59:37] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[06:59:41] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[06:59:45] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[06:59:49] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[06:59:53] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[06:59:57] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[07:00:01] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[07:00:05] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[07:00:09] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[07:00:13] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[07:00:17] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[07:00:21] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[07:00:25] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[07:00:27] -!- richardboegli1 [richardboegli1!~r@180-32-566-585.dyn.iinet.net.au] has joined #rss-bot
[07:00:29] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[07:00:33] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[07:00:38] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[07:00:42] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[07:00:46] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[07:00:50] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[07:00:54] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[07:00:58] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[07:01:02] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[07:01:06] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[07:01:10] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[07:01:14] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[07:01:18] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[07:01:22] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[07:01:26] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[07:01:30] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[07:01:34] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[07:01:38] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[07:01:42] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[07:01:43] <Bender> [Bugtraq] - Bugtraq: [SECURITY] [DSA 3457-1] iceweasel security update - http://www.securityfocus.com
[07:01:46] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[07:01:47] <Bender> [Bugtraq] - Bugtraq: [SECURITY] [DSA 3458-1] openjdk-7 security update - http://www.securityfocus.com
[07:01:50] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[07:01:53] <Bender> [HackerNews] - Dear Hedge Funds: Index Funds Didn’t Eat Your Returns - http://www.pragcap.com
[07:01:54] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[07:01:58] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[07:02:02] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[07:02:06] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[07:02:10] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[07:02:14] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[07:02:14] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[07:02:18] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[07:02:18] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[07:02:22] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[07:02:22] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[07:02:26] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[07:02:26] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[07:02:30] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[07:02:30] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[07:02:34] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[07:02:34] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[07:02:38] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[07:02:38] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[07:02:42] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[07:02:42] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[07:02:46] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[07:02:46] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[07:02:50] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[07:02:50] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[07:02:54] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[07:02:54] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[07:02:58] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[07:02:58] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[07:03:02] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[07:03:02] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[07:03:06] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[07:03:06] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[07:03:07] -!- richardboegliAFK has quit [Ping timeout: 268 seconds]
[07:03:10] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[07:03:10] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[07:03:14] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[07:03:14] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[07:03:18] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[07:03:18] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[07:03:22] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[07:03:22] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[07:03:26] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[07:03:26] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[07:03:30] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[07:03:30] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[07:03:34] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[07:03:38] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[07:03:42] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[07:03:46] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[07:03:50] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[07:03:54] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[07:06:57] <Bender> [HackerNews] - What’s Apple’s competitive edge going forward? - http://blogs.harvard.edu
[07:07:01] <Bender> [HackerNews] - Will China’s new “supply-side” reforms help China? - http://blog.mpettis.com
[07:07:20] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[07:07:24] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[07:07:28] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[07:07:44] <Bender> [TheRegister] - All-flash hope-dash: The future is hybrid - http://go.theregister.com
[07:12:01] <Bender> [HackerNews] - Rigor.com (Perf Monitoring Company) Removes Critique on Article Attacking RUM - http://rigor.com
[07:12:22] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[07:17:05] <Bender> [HackerNews] - Shan-Zhen: How a Small Irish Town Influenced the Mega-City Shenzhen - http://www.archdaily.com
[07:17:25] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[07:22:08] <Bender> [HackerNews] - The 1986 ACM Conference on the History of Personal Workstations - http://www.computerhistory.org
[07:22:12] <Bender> [HackerNews] - React and the economics of dynamic web interfaces - https://www.nczonline.net
[07:22:33] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[07:22:37] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[07:22:41] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[07:22:45] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[07:22:49] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[07:22:53] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[07:22:57] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[07:23:01] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[07:23:05] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[07:23:09] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[07:23:13] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[07:23:17] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[07:23:21] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[07:23:25] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[07:23:29] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[07:23:33] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[07:23:37] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[07:23:41] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[07:23:45] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[07:23:49] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[07:23:53] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[07:23:57] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[07:24:01] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[07:24:05] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[07:24:09] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[07:24:13] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[07:24:17] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[07:24:21] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[07:24:25] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[07:24:29] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[07:24:33] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[07:24:37] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[07:24:41] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[07:24:45] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[07:24:49] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[07:24:53] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[07:24:57] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[07:25:01] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[07:25:06] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[07:25:10] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[07:25:14] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[07:25:18] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[07:25:22] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[07:25:26] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[07:25:30] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[07:25:34] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[07:25:38] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[07:25:42] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[07:25:46] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[07:25:50] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[07:25:54] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[07:25:58] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[07:26:02] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[07:26:06] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[07:26:10] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[07:26:14] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[07:26:18] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[07:26:22] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[07:26:26] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[07:26:30] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[07:26:34] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[07:26:38] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[07:26:42] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[07:26:46] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[07:26:50] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[07:26:54] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[07:26:58] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[07:27:02] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[07:27:06] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[07:27:10] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[07:27:11] <Bender> [ForbesTech] - Who Does Most Harm To Global Innovation? India, China And Thailand - http://www.forbes.com
[07:27:12] <Bender> [HackerNews] - System Integrity Management Platform (SIMP) – By the NSA - http://sylnt.us
[07:27:14] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[07:27:16] <Bender> [HackerNews] - New paper by Robin Dunbar exploring social media vs. real world networks - http://rsos.royalsocietypublishing.org
[07:27:18] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[07:27:22] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[07:27:26] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[07:27:30] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[07:27:34] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[07:27:38] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[07:27:42] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[07:27:46] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[07:27:50] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[07:27:54] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[07:27:58] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[07:28:02] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[07:28:06] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[07:28:10] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[07:28:14] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[07:28:18] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[07:28:22] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[07:28:26] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[07:28:30] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[07:28:34] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[07:28:38] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[07:28:42] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[07:28:46] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[07:28:50] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[07:28:54] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[07:28:58] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[07:29:02] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[07:29:06] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[07:29:10] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[07:29:14] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[07:29:18] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[07:29:22] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[07:29:26] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[07:29:30] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[07:29:34] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[07:29:39] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[07:29:43] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[07:29:47] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[07:29:51] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[07:29:55] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[07:29:59] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[07:30:03] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[07:30:07] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[07:30:11] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[07:30:15] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[07:30:19] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[07:30:23] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[07:30:27] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[07:30:31] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[07:30:35] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[07:30:39] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[07:30:43] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[07:30:47] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[07:30:51] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[07:30:55] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[07:30:59] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[07:31:03] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[07:31:07] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[07:31:11] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[07:31:15] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[07:31:19] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[07:31:23] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[07:31:27] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[07:31:31] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[07:31:35] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[07:31:39] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[07:31:43] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[07:31:47] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[07:31:51] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[07:31:55] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[07:31:59] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[07:32:03] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[07:32:07] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[07:32:11] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[07:32:15] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[07:32:19] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[07:32:23] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[07:32:27] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[07:32:31] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[07:32:35] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[07:32:37] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[07:32:39] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[07:32:41] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[07:32:43] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[07:32:45] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[07:32:47] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[07:32:49] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[07:32:51] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[07:32:53] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[07:32:55] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[07:32:57] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[07:32:59] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[07:33:01] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[07:33:03] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[07:33:05] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[07:33:07] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[07:33:09] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[07:33:11] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[07:33:13] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[07:33:15] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[07:33:17] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[07:33:19] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[07:33:21] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[07:33:24] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[07:33:25] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[07:33:28] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[07:33:29] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[07:33:32] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[07:33:33] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[07:33:36] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[07:33:37] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[07:33:40] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[07:33:41] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[07:33:44] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[07:33:45] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[07:33:48] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[07:33:49] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[07:33:52] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[07:33:53] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[07:33:56] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[07:33:57] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[07:34:00] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[07:34:01] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[07:34:04] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[07:34:05] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[07:34:08] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[07:34:09] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[07:34:12] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[07:34:13] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[07:34:16] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[07:34:17] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[07:34:20] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[07:34:21] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[07:34:24] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[07:34:25] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[07:34:28] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[07:34:29] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[07:34:32] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[07:34:33] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[07:34:36] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[07:34:37] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[07:34:40] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[07:34:41] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[07:34:44] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[07:34:45] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[07:34:48] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[07:34:49] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[07:34:52] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[07:34:53] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[07:34:56] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[07:34:57] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[07:35:00] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[07:35:01] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[07:35:04] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[07:35:05] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[07:35:08] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[07:35:09] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[07:35:12] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[07:35:13] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[07:35:16] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[07:35:17] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[07:35:20] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[07:35:21] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[07:35:24] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[07:35:25] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[07:35:28] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[07:35:29] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[07:35:32] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[07:35:33] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[07:35:36] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[07:35:37] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[07:35:40] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[07:35:41] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[07:35:44] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[07:35:45] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[07:35:48] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[07:35:49] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[07:35:52] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[07:35:53] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[07:35:56] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[07:35:57] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[07:36:00] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[07:36:02] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[07:36:04] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[07:36:06] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[07:36:08] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[07:36:10] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[07:36:12] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[07:36:14] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[07:36:16] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[07:36:18] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[07:36:20] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[07:36:22] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[07:36:24] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[07:36:26] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[07:36:28] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[07:36:30] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[07:36:32] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[07:36:34] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[07:36:36] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[07:36:38] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[07:36:40] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[07:36:42] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[07:36:44] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[07:36:46] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[07:36:48] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[07:36:50] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[07:36:52] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[07:36:54] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[07:36:56] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[07:36:58] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[07:37:00] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[07:37:02] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[07:37:04] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[07:37:06] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[07:37:08] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[07:37:10] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[07:37:12] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[07:37:14] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[07:37:16] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[07:37:18] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[07:37:20] <Bender> [HackerNews] - Marvin Minsky’s Marvelous Meat Machine - https://medium.com
[07:37:20] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[07:37:22] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[07:37:24] <Bender> [HackerNews] - Air Head: How Aviation Made the Modern Mind - http://www.newyorker.com
[07:37:24] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[07:37:28] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[07:37:32] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[07:37:36] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[07:37:41] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[07:37:41] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[07:37:45] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[07:37:45] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[07:37:49] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[07:37:49] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[07:37:53] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[07:37:53] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[07:37:57] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[07:37:57] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[07:38:01] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[07:38:01] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[07:38:05] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[07:38:05] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[07:38:07] <Bender> [TheRegister] - We've all suffered hangovers, but Qualcomm's right now is something epic - http://go.theregister.com
[07:38:09] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[07:38:09] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[07:38:13] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[07:38:13] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[07:38:17] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[07:38:17] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[07:38:21] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[07:38:21] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[07:38:25] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[07:38:25] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[07:38:29] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[07:38:29] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[07:38:33] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[07:38:33] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[07:38:37] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[07:38:37] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[07:38:41] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[07:38:41] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[07:38:45] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[07:38:45] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[07:38:49] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[07:38:49] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[07:38:53] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[07:38:53] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[07:38:57] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[07:38:57] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[07:39:01] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[07:39:01] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[07:39:05] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[07:39:09] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[07:39:13] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[07:39:17] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[07:39:21] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[07:42:44] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[07:42:48] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[07:42:52] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[07:47:48] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[07:52:32] <Bender> [HackerNews] - The Fire Last Time: The Bronze Age Apocalypse - http://thebreakingtime.typepad.com
[07:52:52] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[08:02:39] <Bender> [HackerNews] - Ancestry and Long-Run Growth - http://econlog.econlib.org
[08:03:15] <Bender> [PhysOrg] - Study finds toxic pollutants in fish across the world's oceans - http://phys.org
[08:03:19] <Bender> [PhysOrg] - Want to feel better? Move to Hawaii, Alaska - http://phys.org
[08:03:24] <Bender> [PhysOrg] - California wrestles with making self-driving cars public - http://phys.org
[08:03:26] <Bender> [TheRegister] - Sensors, not CPUs, are the tech that swings the smartphone market - http://go.theregister.com
[08:03:28] <Bender> [PhysOrg] - Facebook to expand beyond its 'like' button 'pretty soon' - http://phys.org
[08:03:32] <Bender> [PhysOrg] - Analysis of racial polling shows whites more aware of racism - http://phys.org
[08:03:36] <Bender> [PhysOrg] - Smartphone shipments hit record high in 2015: report - http://phys.org
[08:08:04] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[08:08:08] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[08:08:13] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[08:08:17] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[08:08:19] <Bender> [PhysOrg] - NASA remembers astronauts killed, pledges to reach Mars - http://phys.org
[08:08:21] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[08:08:25] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[08:08:29] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[08:08:32] <Bender> [SoylentNews] - Ubisoft is Killing the Best Game It’s Made in Years - http://sylnt.us
[08:08:33] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[08:08:37] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[08:08:41] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[08:08:41] -!- richardboegli1 has quit [Read error: Connection reset by peer]
[08:08:45] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[08:08:49] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[08:08:53] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[08:08:57] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[08:09:01] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[08:09:05] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[08:09:09] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[08:09:13] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[08:09:17] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[08:09:21] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[08:09:25] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[08:09:29] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[08:09:33] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[08:09:34] -!- richardboegli [richardboegli!~r@180-32-566-585.dyn.iinet.net.au] has joined #rss-bot
[08:09:37] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[08:09:41] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[08:09:43] <Bender> [UCLAHealth] - Electric patch holds promise for treating PTSD - http://newsroom.ucla.edu
[08:09:45] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[08:09:49] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[08:09:53] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[08:09:57] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[08:10:01] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[08:10:05] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[08:10:09] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[08:10:13] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[08:10:17] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[08:10:21] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[08:10:25] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[08:10:29] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[08:10:33] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[08:10:37] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[08:10:41] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[08:10:45] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[08:10:49] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[08:10:53] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[08:10:57] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[08:11:01] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[08:11:05] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[08:11:09] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[08:11:13] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[08:11:17] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[08:11:21] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[08:11:25] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[08:11:29] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[08:11:33] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[08:11:37] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[08:11:41] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[08:11:45] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[08:11:49] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[08:11:53] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[08:11:57] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[08:12:01] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[08:12:05] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[08:12:09] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[08:12:13] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[08:12:17] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[08:12:21] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[08:12:25] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[08:12:29] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[08:12:33] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[08:12:38] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[08:12:42] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[08:12:46] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[08:12:47] <Bender> [HackerNews] - China: Surviving the Camps - http://www.nybooks.com
[08:12:50] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[08:12:54] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[08:12:58] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[08:13:02] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[08:13:06] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[08:13:07] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[08:13:10] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[08:13:12] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[08:13:14] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[08:13:16] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[08:13:18] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[08:13:20] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[08:13:22] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[08:13:24] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[08:13:26] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[08:13:28] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[08:13:30] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[08:13:32] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[08:13:34] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[08:13:36] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[08:13:38] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[08:13:40] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[08:13:42] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[08:13:44] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[08:13:46] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[08:13:48] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[08:13:50] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[08:13:52] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[08:13:54] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[08:13:56] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[08:13:58] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[08:14:00] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[08:14:02] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[08:14:04] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[08:14:06] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[08:14:08] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[08:14:10] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[08:14:12] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[08:14:14] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[08:14:16] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[08:14:18] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[08:14:20] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[08:14:22] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[08:14:24] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[08:14:26] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[08:14:28] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[08:14:30] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[08:14:32] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[08:14:34] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[08:14:36] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[08:14:38] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[08:14:40] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[08:14:42] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[08:14:44] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[08:14:46] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[08:14:48] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[08:14:50] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[08:14:52] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[08:14:54] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[08:14:56] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[08:14:58] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[08:15:00] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[08:15:02] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[08:15:04] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[08:15:06] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[08:15:08] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[08:15:10] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[08:15:12] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[08:15:14] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[08:15:16] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[08:15:18] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[08:15:20] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[08:15:22] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[08:15:24] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[08:15:26] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[08:15:28] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[08:15:30] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[08:15:32] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[08:15:34] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[08:15:36] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[08:15:38] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[08:15:40] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[08:15:42] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[08:15:44] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[08:15:46] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[08:15:48] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[08:15:50] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[08:15:52] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[08:15:54] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[08:15:56] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[08:15:58] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[08:16:00] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[08:16:02] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[08:16:04] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[08:16:06] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[08:16:08] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[08:16:10] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[08:16:12] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[08:16:14] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[08:16:16] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[08:16:18] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[08:16:20] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[08:16:22] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[08:16:24] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[08:16:26] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[08:16:28] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[08:16:30] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[08:16:32] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[08:16:34] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[08:16:36] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[08:16:38] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[08:16:40] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[08:16:42] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[08:16:44] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[08:16:46] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[08:16:48] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[08:16:50] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[08:16:52] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[08:16:54] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[08:16:56] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[08:16:58] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[08:17:00] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[08:17:02] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[08:17:04] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[08:17:06] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[08:17:08] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[08:17:10] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[08:17:12] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[08:17:14] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[08:17:16] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[08:17:18] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[08:17:20] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[08:17:22] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[08:17:24] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[08:17:27] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[08:17:28] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[08:17:31] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[08:17:32] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[08:17:35] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[08:17:36] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[08:17:39] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[08:17:40] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[08:17:43] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[08:17:44] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[08:17:47] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[08:17:49] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[08:17:51] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[08:17:51] <Bender> [HackerNews] - When Edison, Ford and Friends Went Road-Tripping in Model Ts - http://www.smithsonianmag.com
[08:17:53] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[08:17:55] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[08:17:59] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[08:18:03] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[08:18:07] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[08:18:11] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[08:18:11] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[08:18:15] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[08:18:15] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[08:18:19] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[08:18:19] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[08:18:23] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[08:18:23] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[08:18:27] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[08:18:27] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[08:18:31] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[08:18:31] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[08:18:35] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[08:18:35] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[08:18:39] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[08:18:39] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[08:18:43] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[08:18:43] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[08:18:47] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[08:18:48] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[08:18:51] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[08:18:52] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[08:18:55] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[08:18:56] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[08:18:59] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[08:19:00] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[08:19:03] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[08:19:04] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[08:19:07] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[08:19:08] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[08:19:11] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[08:19:12] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[08:19:15] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[08:19:16] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[08:19:19] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[08:19:20] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[08:19:23] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[08:19:24] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[08:19:27] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[08:19:28] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[08:19:31] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[08:19:32] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[08:19:35] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[08:19:36] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[08:19:39] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[08:19:40] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[08:19:43] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[08:19:44] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[08:19:47] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[08:19:48] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[08:19:51] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[08:19:52] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[08:19:55] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[08:19:59] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[08:20:03] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[08:20:07] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[08:20:11] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[08:20:15] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[08:20:19] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[08:20:23] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[08:20:27] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[08:20:31] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[08:20:35] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[08:20:39] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[08:20:43] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[08:20:47] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[08:20:51] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[08:20:55] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[08:20:59] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[08:21:03] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[08:21:07] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[08:21:11] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[08:21:15] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[08:21:19] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[08:21:23] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[08:21:27] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[08:21:31] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[08:21:35] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[08:21:39] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[08:21:43] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[08:21:47] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[08:21:51] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[08:21:55] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[08:21:59] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[08:22:03] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[08:22:07] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[08:22:12] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[08:22:16] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[08:22:20] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[08:22:24] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[08:22:28] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[08:22:32] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[08:22:36] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[08:22:40] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[08:22:44] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[08:22:48] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[08:22:52] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[08:22:56] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[08:23:00] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[08:23:04] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[08:23:08] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[08:23:12] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[08:23:15] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[08:23:16] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[08:23:19] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[08:23:20] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[08:23:23] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[08:23:24] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[08:23:28] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[08:23:31] <Bender> [PhysOrg] - Samsung warns of tough 2016 after 4Q profit sinks - http://phys.org
[08:23:32] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[08:23:36] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[08:23:40] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[08:23:42] <Bender> [TheRegister] - EMC Federation to reveal new hyper-hyper converged appliances - http://go.theregister.com
[08:23:44] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[08:23:48] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[08:23:52] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[08:23:56] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[08:24:00] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[08:24:04] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[08:24:08] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[08:24:12] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[08:24:16] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[08:24:20] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[08:24:24] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[08:24:28] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[08:24:32] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[08:27:59] <Bender> [HackerNews] - BotLibre – Free Open Artificial Intelligence for Everyone - http://www.botlibre.org
[08:28:19] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[08:33:01] <Bender> [ForbesTech] - Brain's Memory Capacity Rivals The World Wide Web - http://www.forbes.com
[08:33:02] <Bender> [HackerNews] - You're About to Hate Slack as Much as You Hate E-Mail - http://www.bloomberg.com
[08:33:23] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[08:33:39] <Bender> [PhysOrg] - Study finds automatic braking cuts rear-end crash risk - http://phys.org
[08:43:10] <Bender> [HackerNews] - Resisting a mobile future is futile - http://blog.contactlight.co
[08:43:14] <Bender> [HackerNews] - Kaspersky Realtime Cyberthreat Map - https://cybermap.kaspersky.com
[08:43:19] <Bender> [HackerNews] - Reubano/meza: A Python toolkit for processing tabular data - http://sylnt.us
[08:43:23] <Bender> [HackerNews] - The Dark Side of Cryptography: Kleptography in Black-Box Implementations (2003) - http://www.infosecurity-magazine.com
[08:43:33] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[08:43:37] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[08:43:41] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[08:43:45] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[08:43:46] <Bender> [PhysOrg] - Canada to consider CO2 emissions in approving new pipelines - http://phys.org
[08:43:49] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[08:43:53] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[08:43:57] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[08:43:57] <Bender> [TheRegister] - 2Back to the Future's DeLorean is coming back to the future - http://go.theregister.com
[08:44:01] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[08:44:05] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[08:44:09] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[08:44:13] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[08:44:17] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[08:44:21] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[08:44:25] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[08:44:29] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[08:44:33] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[08:44:37] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[08:44:41] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[08:44:45] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[08:44:49] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[08:44:53] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[08:44:57] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[08:45:01] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[08:45:05] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[08:45:09] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[08:45:13] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[08:45:17] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[08:45:22] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[08:45:26] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[08:45:30] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[08:45:34] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[08:45:38] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[08:45:42] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[08:45:46] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[08:45:50] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[08:45:54] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[08:45:58] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[08:46:02] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[08:46:06] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[08:46:10] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[08:46:14] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[08:46:18] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[08:46:22] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[08:46:26] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[08:46:30] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[08:46:34] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[08:46:38] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[08:46:42] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[08:46:46] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[08:46:50] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[08:46:54] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[08:46:58] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[08:47:02] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[08:47:06] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[08:47:10] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[08:47:14] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[08:47:18] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[08:47:22] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[08:47:26] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[08:47:30] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[08:47:34] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[08:47:38] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[08:47:42] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[08:47:46] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[08:47:50] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[08:47:54] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[08:47:58] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[08:48:02] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[08:48:06] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[08:48:10] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[08:48:14] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[08:48:18] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[08:48:22] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[08:48:26] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[08:48:30] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[08:48:34] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[08:48:38] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[08:48:42] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[08:48:46] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[08:48:50] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[08:48:54] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[08:48:58] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[08:49:02] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[08:49:06] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[08:49:10] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[08:49:14] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[08:49:18] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[08:49:22] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[08:49:26] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[08:49:30] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[08:49:34] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[08:49:38] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[08:49:42] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[08:49:46] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[08:49:51] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[08:49:55] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[08:49:59] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[08:50:03] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[08:50:07] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[08:50:11] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[08:50:15] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[08:50:19] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[08:50:23] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[08:50:27] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[08:50:31] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[08:50:35] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[08:50:39] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[08:50:43] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[08:50:47] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[08:50:51] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[08:50:55] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[08:50:59] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[08:51:03] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[08:51:07] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[08:51:11] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[08:51:15] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[08:51:19] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[08:51:23] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[08:51:27] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[08:51:31] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[08:51:35] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[08:51:39] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[08:51:43] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[08:51:47] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[08:51:51] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[08:51:55] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[08:51:59] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[08:52:03] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[08:52:07] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[08:52:11] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[08:52:15] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[08:52:19] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[08:52:23] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[08:52:27] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[08:52:31] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[08:52:35] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[08:52:39] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[08:52:43] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[08:52:47] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[08:52:51] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[08:52:55] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[08:52:59] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[08:53:03] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[08:53:07] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[08:53:11] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[08:53:15] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[08:53:19] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[08:53:23] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[08:53:27] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[08:53:31] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[08:53:35] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[08:53:39] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[08:53:39] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[08:53:43] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[08:53:43] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[08:53:47] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[08:53:47] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[08:53:51] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[08:53:51] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[08:53:54] <Bender> [PhysOrg] - Making operating systems safer and faster with 'unikernels' - http://phys.org
[08:53:55] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[08:53:55] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[08:53:58] <Bender> [PhysOrg] - ESA image: Mercury orbiter test - http://phys.org
[08:53:59] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[08:53:59] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[08:54:03] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[08:54:03] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[08:54:07] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[08:54:07] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[08:54:11] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[08:54:12] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[08:54:15] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[08:54:16] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[08:54:19] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[08:54:20] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[08:54:23] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[08:54:24] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[08:54:27] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[08:54:28] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[08:54:31] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[08:54:32] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[08:54:35] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[08:54:36] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[08:54:39] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[08:54:40] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[08:54:43] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[08:54:44] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[08:54:47] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[08:54:48] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[08:54:51] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[08:54:52] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[08:54:55] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[08:54:56] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[08:54:59] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[08:55:00] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[08:55:03] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[08:55:04] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[08:55:07] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[08:55:08] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[08:55:11] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[08:55:12] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[08:55:15] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[08:55:16] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[08:55:19] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[08:55:20] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[08:55:23] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[08:55:24] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[08:55:27] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[08:55:28] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[08:55:31] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[08:55:32] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[08:55:35] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[08:55:36] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[08:55:39] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[08:55:40] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[08:55:43] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[08:55:44] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[08:55:47] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[08:55:48] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[08:55:51] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[08:55:52] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[08:55:55] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[08:55:56] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[08:55:59] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[08:56:00] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[08:56:03] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[08:56:04] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[08:56:07] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[08:56:08] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[08:56:11] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[08:56:12] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[08:56:15] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[08:56:16] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[08:56:19] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[08:56:20] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[08:56:23] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[08:56:24] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[08:56:27] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[08:56:28] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[08:56:31] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[08:56:32] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[08:56:35] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[08:56:36] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[08:56:39] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[08:56:40] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[08:56:43] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[08:56:44] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[08:56:47] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[08:56:48] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[08:56:51] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[08:56:52] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[08:56:55] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[08:56:56] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[08:56:59] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[08:57:00] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[08:57:03] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[08:57:04] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[08:57:07] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[08:57:08] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[08:57:11] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[08:57:12] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[08:57:15] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[08:57:16] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[08:57:19] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[08:57:20] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[08:57:23] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[08:57:24] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[08:57:27] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[08:57:28] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[08:57:31] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[08:57:32] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[08:57:35] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[08:57:36] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[08:57:39] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[08:57:40] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[08:57:43] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[08:57:44] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[08:57:47] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[08:57:48] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[08:57:51] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[08:57:52] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[08:57:55] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[08:57:56] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[08:58:00] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[08:58:00] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[08:58:04] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[08:58:04] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[08:58:08] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[08:58:08] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[08:58:12] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[08:58:12] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[08:58:16] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[08:58:16] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[08:58:20] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[08:58:20] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[08:58:22] <Bender> [HackerNews] - Siri, Alexa and Other Virtual Assistants Put to the Test - http://www.nytimes.com
[08:58:24] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[08:58:24] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[08:58:28] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[08:58:32] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[08:58:36] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[08:58:41] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[08:58:42] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[08:58:45] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[08:58:46] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[08:58:49] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[08:58:50] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[08:58:53] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[08:58:54] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[08:58:57] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[08:58:59] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[08:59:01] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[08:59:03] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[08:59:05] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[08:59:07] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[08:59:09] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[08:59:11] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[08:59:13] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[08:59:15] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[08:59:17] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[08:59:19] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[08:59:21] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[08:59:23] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[08:59:25] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[08:59:27] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[08:59:29] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[08:59:31] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[08:59:33] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[08:59:35] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[08:59:37] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[08:59:39] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[08:59:41] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[08:59:43] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[08:59:45] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[08:59:47] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[08:59:49] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[08:59:51] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[08:59:53] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[08:59:55] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[08:59:57] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[08:59:59] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[09:00:01] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[09:00:03] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[09:00:07] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[09:00:11] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[09:00:15] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[09:00:19] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[09:00:23] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[09:03:48] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[09:03:53] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[09:03:57] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[09:08:30] <Bender> [HackerNews] - Qurasense is hiring a lead app developer - http://blog.qurasense.com
[09:08:50] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[09:09:06] <Bender> [PhysOrg] - New state of matter holds promise for ultracompact data storage and processing - http://phys.org
[09:09:17] <Bender> [TheRegister] - Hewlett Packard Enterprise axing services techies again - http://go.theregister.com
[09:09:18] <Bender> [SoylentNews] - Chinese Bluboo to Launch World's First Global Triple-SIM Phone - http://sylnt.us
[09:13:34] <Bender> [HackerNews] - SSO-23: Memory-Optimal Small String Optimization Implementation for C++ - http://sylnt.us
[09:18:58] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[09:19:24] <Bender> [TheRegister] - TalkTalk CuffCuffs 'ScamScam CrimCrims' - http://go.theregister.com
[09:24:03] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[09:24:07] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[09:24:11] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[09:24:15] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[09:24:19] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[09:24:23] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[09:24:27] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[09:24:31] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[09:24:35] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[09:24:39] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[09:24:43] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[09:24:47] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[09:24:51] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[09:24:55] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[09:24:59] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[09:25:03] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[09:25:07] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[09:25:11] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[09:25:15] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[09:25:19] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[09:25:23] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[09:25:27] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[09:25:31] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[09:25:35] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[09:25:39] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[09:25:43] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[09:25:47] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[09:25:51] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[09:25:55] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[09:25:59] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[09:26:03] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[09:26:07] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[09:26:11] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[09:26:15] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[09:26:19] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[09:26:23] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[09:26:27] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[09:26:31] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[09:26:35] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[09:26:39] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[09:26:43] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[09:26:47] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[09:26:51] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[09:26:55] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[09:26:59] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[09:27:03] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[09:27:07] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[09:27:11] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[09:27:15] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[09:27:19] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[09:27:23] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[09:27:27] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[09:27:31] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[09:27:35] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[09:27:39] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[09:27:43] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[09:27:47] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[09:27:51] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[09:27:55] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[09:27:59] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[09:28:03] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[09:28:07] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[09:28:11] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[09:28:15] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[09:28:19] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[09:28:23] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[09:28:27] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[09:28:32] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[09:28:36] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[09:28:40] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[09:28:44] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[09:28:45] <Bender> [HackerNews] - Undefined Behavior in LLVM [pdf] - http://www.cs.utah.edu
[09:28:48] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[09:28:52] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[09:28:56] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[09:29:00] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[09:29:04] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[09:29:06] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[09:29:08] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[09:29:10] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[09:29:12] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[09:29:14] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[09:29:16] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[09:29:18] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[09:29:20] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[09:29:21] <Bender> [PhysOrg] - Mammoth bones unearthed on Oregon State football field - http://phys.org
[09:29:22] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[09:29:24] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[09:29:26] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[09:29:28] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[09:29:30] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[09:29:32] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[09:29:34] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[09:29:36] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[09:29:38] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[09:29:40] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[09:29:42] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[09:29:44] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[09:29:46] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[09:29:48] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[09:29:50] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[09:29:52] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[09:29:54] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[09:29:56] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[09:29:58] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[09:30:00] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[09:30:02] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[09:30:04] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[09:30:06] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[09:30:08] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[09:30:10] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[09:30:12] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[09:30:14] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[09:30:16] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[09:30:18] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[09:30:20] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[09:30:22] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[09:30:24] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[09:30:26] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[09:30:28] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[09:30:30] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[09:30:32] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[09:30:34] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[09:30:36] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[09:30:38] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[09:30:40] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[09:30:42] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[09:30:44] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[09:30:46] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[09:30:48] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[09:30:50] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[09:30:52] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[09:30:54] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[09:30:56] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[09:30:58] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[09:31:00] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[09:31:02] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[09:31:04] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[09:31:06] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[09:31:08] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[09:31:10] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[09:31:12] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[09:31:15] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[09:31:16] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[09:31:19] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[09:31:20] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[09:31:23] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[09:31:24] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[09:31:27] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[09:31:28] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[09:31:31] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[09:31:32] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[09:31:35] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[09:31:36] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[09:31:39] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[09:31:40] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[09:31:43] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[09:31:44] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[09:31:47] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[09:31:48] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[09:31:51] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[09:31:52] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[09:31:55] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[09:31:56] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[09:31:59] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[09:32:00] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[09:32:03] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[09:32:04] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[09:32:07] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[09:32:08] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[09:32:11] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[09:32:12] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[09:32:15] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[09:32:16] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[09:32:19] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[09:32:20] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[09:32:23] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[09:32:24] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[09:32:27] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[09:32:28] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[09:32:31] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[09:32:32] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[09:32:35] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[09:32:36] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[09:32:39] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[09:32:40] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[09:32:43] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[09:32:44] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[09:32:47] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[09:32:48] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[09:32:51] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[09:32:53] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[09:32:55] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[09:32:57] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[09:32:59] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[09:33:01] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[09:33:03] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[09:33:05] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[09:33:07] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[09:33:09] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[09:33:11] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[09:33:13] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[09:33:15] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[09:33:17] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[09:33:19] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[09:33:21] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[09:33:23] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[09:33:25] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[09:33:27] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[09:33:29] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[09:33:31] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[09:33:33] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[09:33:35] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[09:33:37] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[09:33:39] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[09:33:41] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[09:33:43] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[09:33:45] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[09:33:47] <Bender> [ForbesTech] - Chinese Tech Giants Battle Out For Virtual Red Packets - http://www.forbes.com
[09:33:47] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[09:33:49] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[09:33:51] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[09:33:53] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[09:33:57] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[09:34:01] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[09:34:05] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[09:34:09] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[09:34:13] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[09:34:17] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[09:34:21] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[09:34:25] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[09:34:29] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[09:34:33] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[09:34:36] <Bender> [TheRegister] - ICO says TalkTalk customers need to get themselves a lawyer - http://go.theregister.com
[09:34:37] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[09:34:41] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[09:34:45] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[09:34:49] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[09:34:53] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[09:34:57] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[09:35:01] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[09:35:05] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[09:35:09] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[09:35:13] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[09:35:17] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[09:35:21] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[09:35:25] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[09:35:29] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[09:35:33] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[09:35:37] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[09:35:41] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[09:35:45] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[09:35:49] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[09:35:53] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[09:35:57] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[09:36:01] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[09:36:05] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[09:36:09] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[09:36:13] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[09:36:17] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[09:36:21] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[09:36:25] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[09:36:29] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[09:36:33] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[09:36:37] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[09:36:41] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[09:36:45] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[09:36:49] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[09:36:53] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[09:36:57] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[09:37:01] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[09:37:05] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[09:37:10] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[09:37:14] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[09:37:17] -!- richardboegli has quit [Read error: Connection reset by peer]
[09:37:18] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[09:37:22] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[09:37:26] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[09:37:30] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[09:37:34] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[09:37:38] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[09:37:42] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[09:37:46] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[09:37:50] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[09:37:54] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[09:37:58] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[09:37:59] -!- richardboegli [richardboegli!~r@180-32-566-585.dyn.iinet.net.au] has joined #rss-bot
[09:38:02] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[09:38:06] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[09:38:10] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[09:38:14] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[09:38:18] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[09:38:22] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[09:38:26] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[09:38:30] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[09:38:34] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[09:38:38] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[09:38:42] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[09:38:46] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[09:38:50] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[09:38:54] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[09:38:58] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[09:39:02] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[09:39:06] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[09:39:10] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[09:39:13] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[09:39:14] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[09:39:17] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[09:39:18] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[09:39:21] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[09:39:22] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[09:39:25] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[09:39:26] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[09:39:29] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[09:39:30] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[09:39:33] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[09:39:34] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[09:39:37] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[09:39:38] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[09:39:40] <Bender> [TheRegister] - Ban internet anonymity – says US Homeland Security official - http://go.theregister.com
[09:39:41] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[09:39:42] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[09:39:45] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[09:39:46] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[09:39:49] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[09:39:50] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[09:39:53] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[09:39:54] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[09:39:57] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[09:39:58] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[09:40:01] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[09:40:02] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[09:40:05] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[09:40:06] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[09:40:09] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[09:40:10] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[09:40:13] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[09:40:14] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[09:40:17] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[09:40:18] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[09:40:21] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[09:40:22] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[09:40:25] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[09:40:26] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[09:40:29] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[09:40:30] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[09:40:33] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[09:40:37] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[09:40:41] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[09:40:45] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[09:40:50] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[09:40:54] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[09:44:33] <Bender> [PhysOrg] - Tuberculosis: Discovery of a critical stage in the evolution of the bacillus towards pathogenicity - http://phys.org
[09:48:58] <Bender> [ForbesTech] - Touch Mac From Apple 'Inevitable': IDC Analyst - http://www.forbes.com
[09:49:00] <Bender> [HackerNews] - ADHD Is Fuel for Adventure - http://www.outsideonline.com
[09:49:21] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[09:49:25] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[09:49:29] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[09:59:00] <Bender> [CNET] - A new challenger appears: China's Oppo sells 50 million smartphones in 2015 - CNET - http://feedproxy.google.com
[09:59:06] <Bender> [ForbesTech] - Posted: Judicial Redress Act "National Security Interests" Amendment - http://www.forbes.com
[09:59:30] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[10:04:12] <Bender> [HackerNews] - Carbon dioxide captured from air can be directly converted into methanol fuel - http://phys.org
[10:04:33] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[10:04:37] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[10:04:41] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[10:04:45] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[10:04:49] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[10:04:53] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[10:04:57] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[10:05:01] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[10:05:05] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[10:05:09] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[10:05:13] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[10:05:17] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[10:05:21] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[10:05:25] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[10:05:29] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[10:05:33] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[10:05:37] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[10:05:41] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[10:05:45] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[10:05:49] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[10:05:53] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[10:05:57] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[10:06:01] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[10:06:05] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[10:06:09] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[10:06:13] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[10:06:17] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[10:06:21] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[10:06:25] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[10:06:29] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[10:06:33] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[10:06:37] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[10:06:41] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[10:06:45] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[10:06:49] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[10:06:53] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[10:06:57] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[10:07:01] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[10:07:05] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[10:07:09] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[10:07:13] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[10:07:17] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[10:07:21] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[10:07:25] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[10:07:29] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[10:07:33] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[10:07:37] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[10:07:41] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[10:07:45] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[10:07:49] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[10:07:53] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[10:07:57] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[10:08:01] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[10:08:05] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[10:08:09] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[10:08:13] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[10:08:18] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[10:08:22] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[10:08:26] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[10:08:30] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[10:08:34] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[10:08:38] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[10:08:42] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[10:08:46] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[10:08:50] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[10:08:54] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[10:08:58] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[10:09:02] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[10:09:02] <Bender> [BBCTech] - Wikipedia editors make trustee resign - http://www.bbc.co.uk
[10:09:06] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[10:09:10] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[10:09:14] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[10:09:18] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[10:09:22] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[10:09:26] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[10:09:30] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[10:09:34] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[10:09:37] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[10:09:38] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[10:09:41] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[10:09:42] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[10:09:45] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[10:09:46] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[10:09:49] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[10:09:50] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[10:09:53] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[10:09:54] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[10:09:57] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[10:09:58] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[10:10:01] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[10:10:02] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[10:10:05] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[10:10:06] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[10:10:09] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[10:10:10] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[10:10:13] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[10:10:14] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[10:10:17] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[10:10:18] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[10:10:21] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[10:10:22] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[10:10:25] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[10:10:26] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[10:10:29] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[10:10:30] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[10:10:33] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[10:10:35] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[10:10:37] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[10:10:39] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[10:10:41] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[10:10:43] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[10:10:45] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[10:10:47] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[10:10:49] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[10:10:51] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[10:10:53] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[10:10:55] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[10:10:57] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[10:10:59] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[10:11:01] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[10:11:03] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[10:11:05] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[10:11:07] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[10:11:09] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[10:11:11] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[10:11:13] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[10:11:15] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[10:11:17] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[10:11:19] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[10:11:21] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[10:11:23] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[10:11:25] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[10:11:27] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[10:11:29] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[10:11:31] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[10:11:33] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[10:11:35] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[10:11:37] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[10:11:39] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[10:11:41] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[10:11:43] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[10:11:45] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[10:11:47] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[10:11:49] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[10:11:51] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[10:11:53] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[10:11:55] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[10:11:57] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[10:11:59] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[10:12:01] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[10:12:03] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[10:12:05] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[10:12:07] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[10:12:09] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[10:12:11] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[10:12:13] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[10:12:15] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[10:12:17] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[10:12:19] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[10:12:21] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[10:12:23] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[10:12:25] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[10:12:27] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[10:12:29] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[10:12:31] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[10:12:33] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[10:12:35] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[10:12:37] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[10:12:39] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[10:12:41] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[10:12:43] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[10:12:45] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[10:12:47] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[10:12:49] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[10:12:51] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[10:12:53] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[10:12:55] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[10:12:57] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[10:12:59] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[10:13:01] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[10:13:03] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[10:13:05] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[10:13:07] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[10:13:09] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[10:13:11] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[10:13:13] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[10:13:15] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[10:13:17] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[10:13:19] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[10:13:21] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[10:13:23] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[10:13:25] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[10:13:27] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[10:13:29] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[10:13:31] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[10:13:33] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[10:13:35] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[10:13:37] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[10:13:39] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[10:13:42] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[10:13:43] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[10:13:46] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[10:13:47] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[10:13:50] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[10:13:51] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[10:13:54] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[10:13:55] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[10:13:58] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[10:13:59] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[10:14:02] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[10:14:03] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[10:14:06] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[10:14:07] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[10:14:10] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[10:14:11] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[10:14:14] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[10:14:15] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[10:14:18] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[10:14:19] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[10:14:22] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[10:14:23] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[10:14:27] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[10:14:31] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[10:14:35] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[10:14:39] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[10:14:43] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[10:14:47] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[10:14:51] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[10:14:55] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[10:14:56] <Bender> [PhysOrg] - Ariane 5's first launch of 2016 - http://phys.org
[10:14:59] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[10:15:00] <Bender> [PhysOrg] - Stress from noise can be short-lived - http://phys.org
[10:15:03] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[10:15:07] <Bender> [TheRegister] - Europe: Go on. Ask us to probe the £130m 'sweetheart' deal HMRC made with Google - http://go.theregister.com
[10:15:07] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[10:15:12] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[10:15:16] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[10:15:20] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[10:15:24] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[10:15:28] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[10:15:32] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[10:15:36] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[10:15:40] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[10:15:44] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[10:15:48] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[10:15:52] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[10:15:56] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[10:16:00] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[10:16:04] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[10:16:08] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[10:16:12] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[10:16:16] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[10:16:20] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[10:16:24] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[10:16:28] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[10:16:32] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[10:16:36] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[10:16:40] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[10:16:44] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[10:16:48] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[10:16:52] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[10:16:56] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[10:17:00] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[10:17:04] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[10:17:08] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[10:17:12] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[10:17:16] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[10:17:20] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[10:17:24] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[10:17:28] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[10:17:32] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[10:17:36] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[10:17:40] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[10:17:44] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[10:17:48] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[10:17:52] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[10:17:56] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[10:18:00] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[10:18:04] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[10:18:08] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[10:18:12] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[10:18:16] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[10:18:20] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[10:18:24] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[10:18:28] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[10:18:32] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[10:18:36] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[10:18:40] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[10:18:44] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[10:18:48] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[10:18:52] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[10:18:56] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[10:19:00] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[10:19:04] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[10:19:08] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[10:19:12] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[10:19:16] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[10:19:20] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[10:19:23] <Bender> [HackerNews] - How to Run a Sales Kickoff - http://kellblog.com
[10:19:24] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[10:19:28] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[10:19:32] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[10:19:36] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[10:19:41] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[10:19:44] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[10:19:45] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[10:19:48] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[10:19:49] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[10:19:52] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[10:19:53] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[10:19:56] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[10:19:57] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[10:20:00] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[10:20:01] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[10:20:04] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[10:20:05] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[10:20:08] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[10:20:09] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[10:20:12] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[10:20:13] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[10:20:16] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[10:20:17] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[10:20:20] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[10:20:21] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[10:20:24] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[10:20:25] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[10:20:28] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[10:20:29] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[10:20:32] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[10:20:33] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[10:20:36] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[10:20:37] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[10:20:40] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[10:20:41] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[10:20:44] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[10:20:45] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[10:20:48] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[10:20:49] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[10:20:52] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[10:20:53] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[10:20:56] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[10:20:57] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[10:21:00] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[10:21:01] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[10:21:04] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[10:21:05] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[10:21:08] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[10:21:12] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[10:21:16] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[10:21:20] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[10:21:24] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[10:25:03] <Bender> [PhysOrg] - Flourishing vegetation increases carbon dioxide amplitude - http://phys.org
[10:25:07] <Bender> [PhysOrg] - Depositing different materials within a single chip layer could lead to more efficient computers - http://phys.org
[10:29:52] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[10:29:56] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[10:30:00] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[10:34:33] <Bender> [ForbesTech] - Brain's Memory Capacity Rivals World Wide Web - http://www.forbes.com
[10:34:37] <Bender> [ForbesTech] - Game Creator 'Roblox' Comes To Xbox But Not PlayStation - http://www.forbes.com
[10:34:56] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[10:35:11] <Bender> [PhysOrg] - Systematically searching DNA for regulatory elements indicates limits of previous thinking - http://phys.org
[10:35:22] <Bender> [TheRegister] - UK.gov plans to unveil a new Digital Bill - http://go.theregister.com
[10:39:59] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[10:40:15] <Bender> [PhysOrg] - A cleaner ballot box - http://phys.org
[10:40:19] <Bender> [PhysOrg] - Faster drug discovery? Startup develops more cost-effective test for assessing how cells respond to chemicals - http://phys.org
[10:44:41] <Bender> [ForbesTech] - Poor Innovation Policies Are Holding Back The U.S. From Leading The World In This Space, Report Says - http://www.forbes.com
[10:45:19] <Bender> [PhysOrg] - Predicting political surprises and uprisings before they happen - http://phys.org
[10:49:45] <Bender> [ForbesTech] - How Microsoft's Results Can Cheer Investors - http://www.forbes.com
[10:49:46] <Bender> [HackerNews] - Compressing ten years into six months - http://www.johndcook.com
[10:49:50] <Bender> [HackerNews] - Genetically modified mosquitoes used to fight dengue, zika in Brazil - http://latino.foxnews.com
[10:54:50] <Bender> [HackerNews] - Donald Trump gets a programming language – Doesn't follow logic - http://sylnt.us
[11:00:30] <Bender> [PhysOrg] - Research leads to new discoveries about structure of human hair - http://phys.org
[11:04:57] <Bender> [ForbesTech] - 2016 In Video Games - http://www.forbes.com
[11:05:00] <Bender> [ITWorld] - Oracle is planning to kill an attacker's favorite: the Java browser plug-in - http://www.itworld.com
[11:05:01] <Bender> [ForbesTech] - Here Are All The Free PlayStation Plus Games For February - http://www.forbes.com
[11:05:05] <Bender> [ForbesTech] - 2017 Cadillac CT6: Attention German Luxury Sedan Buyers -- Expand Your Horizons - http://www.forbes.com
[11:05:46] <Bender> [TheRegister] - Apple’s retail chief: ‘Touching customers’ key to retail success - http://go.theregister.com
[11:09:56] <Bender> [ComputerWorld] - Why won't we help users create good passwords? - http://rss.computerworld.com
[11:10:02] <Bender> [HackerNews] - What a PhD Really Means in the US National Security Community - https://news.vice.com
[11:10:23] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[11:10:27] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[11:10:31] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[11:10:35] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[11:10:39] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[11:10:43] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[11:10:47] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[11:10:51] <Bender> [SoylentNews] - Why the Calorie is Broken - http://sylnt.us
[11:10:51] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[11:10:55] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[11:10:59] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[11:11:03] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[11:11:07] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[11:11:11] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[11:11:15] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[11:11:20] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[11:11:24] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[11:11:28] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[11:11:32] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[11:11:36] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[11:11:40] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[11:11:44] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[11:11:48] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[11:11:52] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[11:11:56] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[11:12:00] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[11:12:04] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[11:12:08] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[11:12:12] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[11:12:16] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[11:12:20] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[11:12:24] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[11:12:28] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[11:12:32] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[11:12:36] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[11:12:40] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[11:12:44] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[11:12:48] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[11:12:52] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[11:12:56] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[11:13:00] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[11:13:04] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[11:13:08] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[11:13:12] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[11:13:16] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[11:13:20] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[11:13:24] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[11:13:28] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[11:13:32] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[11:13:36] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[11:13:40] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[11:13:44] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[11:13:48] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[11:13:52] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[11:13:56] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[11:14:00] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[11:14:04] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[11:14:08] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[11:14:12] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[11:14:16] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[11:14:20] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[11:14:24] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[11:14:28] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[11:14:32] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[11:14:36] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[11:14:40] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[11:14:44] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[11:14:48] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[11:14:52] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[11:14:56] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[11:15:00] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[11:15:04] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[11:15:08] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[11:15:12] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[11:15:17] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[11:15:21] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[11:15:25] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[11:15:26] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[11:15:29] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[11:15:30] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[11:15:33] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[11:15:35] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[11:15:37] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[11:15:39] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[11:15:41] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[11:15:43] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[11:15:45] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[11:15:47] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[11:15:48] <Bender> [SecurityWeek] - Israel Power Grid Not Hit in Electricity Authority Incident: Report - http://feedproxy.google.com
[11:15:49] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[11:15:51] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[11:15:53] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[11:15:55] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[11:15:57] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[11:15:59] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[11:16:01] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[11:16:03] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[11:16:05] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[11:16:07] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[11:16:09] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[11:16:11] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[11:16:13] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[11:16:15] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[11:16:17] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[11:16:19] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[11:16:21] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[11:16:23] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[11:16:25] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[11:16:27] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[11:16:29] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[11:16:31] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[11:16:33] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[11:16:35] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[11:16:37] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[11:16:39] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[11:16:41] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[11:16:43] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[11:16:45] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[11:16:47] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[11:16:49] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[11:16:51] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[11:16:53] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[11:16:55] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[11:16:57] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[11:16:59] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[11:17:01] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[11:17:03] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[11:17:05] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[11:17:07] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[11:17:09] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[11:17:11] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[11:17:13] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[11:17:15] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[11:17:17] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[11:17:19] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[11:17:21] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[11:17:23] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[11:17:25] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[11:17:27] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[11:17:29] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[11:17:31] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[11:17:33] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[11:17:35] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[11:17:37] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[11:17:39] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[11:17:41] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[11:17:43] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[11:17:45] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[11:17:47] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[11:17:49] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[11:17:51] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[11:17:53] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[11:17:55] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[11:17:57] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[11:17:59] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[11:18:01] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[11:18:03] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[11:18:05] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[11:18:07] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[11:18:09] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[11:18:11] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[11:18:13] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[11:18:15] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[11:18:17] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[11:18:19] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[11:18:21] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[11:18:23] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[11:18:25] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[11:18:27] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[11:18:29] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[11:18:31] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[11:18:33] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[11:18:35] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[11:18:37] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[11:18:39] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[11:18:41] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[11:18:43] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[11:18:45] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[11:18:47] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[11:18:49] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[11:18:51] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[11:18:53] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[11:18:55] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[11:18:57] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[11:19:00] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[11:19:01] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[11:19:04] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[11:19:05] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[11:19:08] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[11:19:09] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[11:19:12] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[11:19:13] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[11:19:16] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[11:19:17] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[11:19:20] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[11:19:21] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[11:19:24] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[11:19:25] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[11:19:28] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[11:19:29] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[11:19:32] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[11:19:33] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[11:19:36] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[11:19:37] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[11:19:40] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[11:19:41] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[11:19:44] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[11:19:45] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[11:19:48] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[11:19:49] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[11:19:52] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[11:19:53] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[11:19:56] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[11:19:57] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[11:20:00] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[11:20:02] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[11:20:04] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[11:20:06] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[11:20:08] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[11:20:10] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[11:20:12] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[11:20:14] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[11:20:15] <Bender> [InnovationsReport] - Toward the Seamless Integration of the Physical and Virtual Worlds - http://www.innovations-report.com
[11:20:18] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[11:20:19] <Bender> [InnovationsReport] - Researchers measure record erosion on Alaskan riverbank - http://www.innovations-report.com
[11:20:22] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[11:20:23] <Bender> [InnovationsReport] - An Attractive new Bat Species from West Africa - http://www.innovations-report.com
[11:20:26] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[11:20:27] <Bender> [InnovationsReport] - New Detection Method for Goby Invasion - http://www.innovations-report.com
[11:20:30] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[11:20:30] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[11:20:34] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[11:20:34] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[11:20:38] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[11:20:38] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[11:20:42] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[11:20:42] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[11:20:46] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[11:20:46] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[11:20:50] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[11:20:50] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[11:20:54] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[11:20:54] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[11:20:58] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[11:20:58] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[11:21:02] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[11:21:02] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[11:21:06] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[11:21:06] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[11:21:10] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[11:21:10] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[11:21:14] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[11:21:14] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[11:21:18] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[11:21:18] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[11:21:22] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[11:21:22] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[11:21:26] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[11:21:26] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[11:21:30] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[11:21:30] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[11:21:34] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[11:21:34] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[11:21:38] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[11:21:39] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[11:21:42] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[11:21:43] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[11:21:46] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[11:21:47] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[11:21:50] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[11:21:51] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[11:21:54] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[11:21:55] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[11:21:58] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[11:21:59] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[11:22:02] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[11:22:03] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[11:22:06] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[11:22:07] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[11:22:10] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[11:22:11] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[11:22:14] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[11:22:18] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[11:22:22] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[11:22:26] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[11:22:30] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[11:22:34] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[11:22:38] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[11:22:42] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[11:22:46] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[11:22:50] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[11:22:54] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[11:22:58] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[11:23:02] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[11:23:06] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[11:23:10] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[11:23:14] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[11:23:18] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[11:23:22] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[11:23:26] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[11:23:30] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[11:23:34] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[11:23:38] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[11:23:42] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[11:23:46] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[11:23:50] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[11:23:54] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[11:23:58] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[11:24:02] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[11:24:06] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[11:24:10] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[11:24:14] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[11:24:18] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[11:24:22] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[11:24:26] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[11:24:30] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[11:24:34] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[11:24:39] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[11:24:43] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[11:24:47] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[11:24:51] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[11:24:55] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[11:24:59] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[11:25:03] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[11:25:07] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[11:25:11] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[11:25:15] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[11:25:19] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[11:25:23] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[11:25:27] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[11:25:31] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[11:25:35] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[11:25:39] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[11:25:43] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[11:25:47] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[11:25:51] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[11:25:55] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[11:25:59] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[11:26:03] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[11:26:07] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[11:26:11] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[11:26:15] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[11:26:19] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[11:26:23] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[11:26:27] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[11:26:31] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[11:26:35] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[11:26:39] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[11:26:43] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[11:26:47] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[11:26:51] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[11:31:04] <Bender> [TheRegister] - Built-in LG smartphone app created data hack risk - http://go.theregister.com
[11:35:19] <Bender> [ForbesTech] - The Dumbest Guy In The Room - http://www.forbes.com
[11:35:23] <Bender> [ForbesTech] - Here Are All The Free Xbox Live With Gold Games Coming February - http://www.forbes.com
[11:35:27] <Bender> [ForbesTech] - PayPal Opens Venmo To Businesses But Don't Expect It To Be A Cash Cow, Yet - http://www.forbes.com
[11:35:42] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[11:35:46] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[11:35:50] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[11:40:19] <Bender> [ComputerWorld] - Chat happens: Your guide to 8 group-chat services - http://rss.computerworld.com
[11:40:23] <Bender> [ForbesTech] - OracleVoice: The Customer Experience Imperative: How To Justify The Investment - http://www.forbes.com
[11:40:25] <Bender> [HackerNews] - Jonathan Blow's new game, The Witness, is out - http://store.steampowered.com
[11:40:46] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[11:45:50] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[11:50:31] <Bender> [ForbesTech] - Game Creator 'Roblox' Comes To Xbox With More Engagement Than 'Pinterest' And 'Reddit' - http://www.forbes.com
[11:50:53] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[11:50:57] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[11:51:01] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[11:51:05] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[11:51:09] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[11:51:13] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[11:51:18] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[11:51:20] <Bender> [TheRegister] - Continuous Lifecycle: Bursting with DevOps and CD goodness - http://go.theregister.com
[11:51:22] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[11:51:26] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[11:51:30] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[11:51:34] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[11:51:38] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[11:51:42] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[11:51:46] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[11:51:50] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[11:51:54] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[11:51:58] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[11:52:02] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[11:52:06] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[11:52:10] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[11:52:14] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[11:52:18] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[11:52:22] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[11:52:26] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[11:52:30] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[11:52:34] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[11:52:38] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[11:52:42] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[11:52:46] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[11:52:50] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[11:52:54] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[11:52:58] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[11:53:02] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[11:53:06] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[11:53:10] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[11:53:14] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[11:53:18] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[11:53:22] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[11:53:26] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[11:53:30] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[11:53:34] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[11:53:38] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[11:53:42] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[11:53:46] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[11:53:50] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[11:53:54] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[11:53:58] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[11:54:02] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[11:54:06] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[11:54:10] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[11:54:14] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[11:54:18] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[11:54:22] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[11:54:26] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[11:54:30] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[11:54:34] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[11:54:38] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[11:54:42] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[11:54:46] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[11:54:50] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[11:54:54] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[11:54:58] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[11:55:02] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[11:55:06] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[11:55:10] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[11:55:14] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[11:55:18] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[11:55:22] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[11:55:26] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[11:55:30] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[11:55:34] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[11:55:37] <Bender> [HackerNews] - The Landscape of Parallelism in C++ [video] - https://www.youtube.com
[11:55:38] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[11:55:42] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[11:55:46] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[11:55:50] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[11:55:55] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[11:55:57] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[11:55:59] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[11:56:01] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[11:56:03] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[11:56:05] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[11:56:07] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[11:56:09] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[11:56:11] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[11:56:13] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[11:56:15] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[11:56:17] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[11:56:19] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[11:56:21] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[11:56:23] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[11:56:25] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[11:56:27] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[11:56:29] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[11:56:31] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[11:56:33] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[11:56:35] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[11:56:37] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[11:56:39] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[11:56:41] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[11:56:43] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[11:56:45] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[11:56:47] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[11:56:49] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[11:56:51] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[11:56:53] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[11:56:55] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[11:56:57] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[11:56:59] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[11:57:01] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[11:57:03] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[11:57:05] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[11:57:07] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[11:57:09] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[11:57:11] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[11:57:13] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[11:57:15] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[11:57:17] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[11:57:19] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[11:57:21] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[11:57:23] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[11:57:25] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[11:57:27] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[11:57:29] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[11:57:31] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[11:57:33] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[11:57:35] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[11:57:37] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[11:57:39] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[11:57:42] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[11:57:43] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[11:57:46] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[11:57:47] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[11:57:50] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[11:57:51] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[11:57:54] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[11:57:55] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[11:57:58] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[11:57:59] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[11:58:02] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[11:58:03] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[11:58:06] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[11:58:07] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[11:58:10] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[11:58:11] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[11:58:14] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[11:58:15] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[11:58:18] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[11:58:19] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[11:58:22] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[11:58:23] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[11:58:26] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[11:58:27] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[11:58:30] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[11:58:31] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[11:58:34] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[11:58:35] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[11:58:38] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[11:58:39] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[11:58:42] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[11:58:43] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[11:58:46] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[11:58:47] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[11:58:50] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[11:58:51] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[11:58:54] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[11:58:55] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[11:58:58] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[11:58:59] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[11:59:02] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[11:59:03] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[11:59:06] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[11:59:07] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[11:59:10] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[11:59:11] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[11:59:14] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[11:59:15] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[11:59:18] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[11:59:19] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[11:59:22] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[11:59:23] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[11:59:26] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[11:59:27] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[11:59:30] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[11:59:31] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[11:59:34] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[11:59:35] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[11:59:38] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[11:59:39] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[11:59:42] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[11:59:43] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[11:59:46] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[11:59:47] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[11:59:50] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[11:59:51] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[11:59:54] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[11:59:55] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[11:59:58] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[11:59:59] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[12:00:02] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[12:00:03] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[12:00:06] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[12:00:07] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[12:00:10] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[12:00:11] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[12:00:14] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[12:00:15] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[12:00:18] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[12:00:19] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[12:00:22] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[12:00:23] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[12:00:26] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[12:00:27] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[12:00:30] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[12:00:31] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[12:00:34] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[12:00:35] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[12:00:38] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[12:00:40] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[12:00:40] <Bender> [HackerNews] - The Need for a Tax on Financial Trading - http://www.nytimes.com
[12:00:42] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[12:00:44] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[12:00:48] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[12:00:52] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[12:00:56] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[12:01:00] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[12:01:01] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[12:01:04] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[12:01:05] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[12:01:08] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[12:01:09] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[12:01:12] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[12:01:13] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[12:01:16] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[12:01:17] <Bender> [PhysOrg] - Game theoretic approaches up the ante on defending cybersecurity resources - http://phys.org
[12:01:17] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[12:01:20] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[12:01:21] <Bender> [PhysOrg] - Entrepreneurship not quite as risky as it may seem, study finds - http://phys.org
[12:01:21] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[12:01:24] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[12:01:25] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[12:01:28] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[12:01:29] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[12:01:32] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[12:01:33] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[12:01:36] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[12:01:37] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[12:01:40] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[12:01:41] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[12:01:44] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[12:01:45] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[12:01:48] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[12:01:49] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[12:01:52] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[12:01:53] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[12:01:56] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[12:01:57] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[12:02:00] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[12:02:01] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[12:02:04] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[12:02:05] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[12:02:08] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[12:02:09] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[12:02:12] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[12:02:13] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[12:02:16] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[12:02:17] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[12:02:20] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[12:02:21] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[12:02:24] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[12:02:25] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[12:02:28] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[12:02:29] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[12:02:32] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[12:02:33] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[12:02:36] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[12:02:37] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[12:02:38] <Bender> [Threatpost] - BlackEnergy APT Group Spreading Malware via Tainted Word Docs - http://threatpost.com
[12:02:40] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[12:02:41] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[12:02:44] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[12:02:48] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[12:02:52] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[12:02:56] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[12:03:00] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[12:03:04] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[12:03:08] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[12:03:12] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[12:03:16] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[12:03:20] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[12:03:24] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[12:03:28] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[12:03:32] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[12:03:36] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[12:03:40] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[12:03:44] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[12:03:48] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[12:03:52] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[12:03:56] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[12:04:00] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[12:04:04] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[12:04:08] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[12:04:12] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[12:04:16] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[12:04:20] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[12:04:24] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[12:04:28] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[12:04:32] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[12:04:36] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[12:04:40] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[12:04:44] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[12:04:48] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[12:04:52] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[12:04:56] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[12:05:00] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[12:05:04] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[12:05:09] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[12:05:13] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[12:05:17] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[12:05:21] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[12:05:25] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[12:05:29] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[12:05:33] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[12:05:37] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[12:05:41] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[12:05:45] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[12:05:49] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[12:05:53] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[12:05:57] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[12:06:01] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[12:06:05] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[12:06:09] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[12:06:13] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[12:06:17] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[12:06:20] <Bender> [PhysOrg] - 'Immigration sanctions do not work', new research says - http://phys.org
[12:06:21] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[12:06:25] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[12:06:29] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[12:06:31] <Bender> [TheRegister] - Can't upgrade, won't upgrade: Windows Mobile's user problem - http://go.theregister.com
[12:06:33] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[12:06:37] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[12:06:41] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[12:06:45] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[12:06:49] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[12:06:53] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[12:06:57] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[12:07:01] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[12:07:05] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[12:07:09] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[12:07:13] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[12:07:17] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[12:07:21] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[12:10:32] <Bender> [ArsTechnica] - Apollo 1, Challenger, and Columbia: Remembering NASA’s lost astronauts - http://arstechnica.com
[12:10:42] <Bender> [ComputerWorld] - Apple is in a position to overtake Samsung as world's top chip buyer - http://rss.computerworld.com
[12:10:46] <Bender> [ComputerWorld] - Verizon is building for the Super Bowl and staying for the boom - http://rss.computerworld.com
[12:11:24] <Bender> [PhysOrg] - Engineers mark completion of Orion's pressure vessel - http://phys.org
[12:11:35] <Bender> [TheRegister] - Apparently we have to give customers the warm fuzzies ... How the heck do we do that? - http://go.theregister.com
[12:12:52] <Bender> [WiredScience] - Zika Virus May Push South America to Loosen Abortion Bans - http://feeds.wired.com
[12:16:13] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[12:16:17] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[12:16:21] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[12:21:17] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[12:21:32] <Bender> [PhysOrg] - Study: Gay couples face pressure to marry, conform to relationship status quo - http://phys.org
[12:21:36] <Bender> [PhysOrg] - Adjusting production processes in real time - http://phys.org
[12:21:40] <Bender> [PhysOrg] - New calibration tool will help astronomers look for habitable exoplanets - http://phys.org
[12:21:43] <Bender> [TheRegister] - OnePlus ends rationing. You can now 2buy its phones just like that! - http://go.theregister.com
[12:22:45] <Bender> [Schneier] - Psychological Model of Selfishness - https://www.schneier.com
[12:25:46] <Bender> [BBCTech] - Netflix suffers block in Indonesia - http://www.bbc.co.uk
[12:25:54] <Bender> [ComputerWorld] - Mingis on Tech: Retailers embrace technology to save their bacon - http://rss.computerworld.com
[12:25:58] <Bender> [ComputerWorld] - Smartphone growth at lowest on concerns about global economy, saturation in China - http://rss.computerworld.com
[12:26:20] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[12:31:03] <Bender> [HackerNews] - Chicago Police Hid Mics, Destroyed Dashcams to Block Audio, Records Show - https://www.dnainfo.com
[12:31:07] <Bender> [HackerNews] - Easy Data Scraping with Google Apps Script - http://www.kutil.org
[12:31:11] <Bender> [HackerNews] - Teen's child poverty song sends shivers down the spine - http://www.magicmum.com
[12:31:16] <Bender> [HackerNews] - Do what you love - http://aleph.vc
[12:31:20] <Bender> [HackerNews] - The conman who pulled off historys most audacious scam - http://www.bbc.com
[12:31:40] <Bender> [PhysOrg] - Production without rigid plans - http://phys.org
[12:35:59] <Bender> [CNET] - Your next insurance agent will be a robot - CNET - http://feedproxy.google.com
[12:36:07] <Bender> [HackerNews] - Completed my SaaS project yesterday. Looking for the first thoughts - http://chatpage.co
[12:41:05] <Bender> [ComputerWorld] - Oracle plans to kill an attacker's favorite: the Java browser plug-in - http://rss.computerworld.com
[12:41:47] <Bender> [PhysOrg] - Why a detachable cabin probably won't save your life in a plane crash - http://phys.org
[12:41:58] <Bender> [TheRegister] - How to be certain about your data in an uncertain future - http://go.theregister.com
[12:42:00] <Bender> [SoylentNews] - Billionaire Boater Destroys almost 14,000 square feet of Reef in Cayman Islands - http://sylnt.us
[12:46:51] <Bender> [PhysOrg] - Google's Go triumph is a milestone for artificial intelligence research - http://phys.org
[12:46:55] <Bender> [PhysOrg] - All-new multi-purpose programmable optical chips - http://phys.org
[12:51:55] <Bender> [PhysOrg] - Key enabling technologies foster economic growth, especially in low-tech EU regions - http://phys.org
[12:51:59] <Bender> [ScienceDaily] - Genetic study provides first-ever insight into biological origin of schizophrenia - http://www.sciencedaily.com
[12:51:59] <Bender> [PhysOrg] - UQ researcher's icy dinosaur hunt - http://phys.org
[12:56:44] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[12:56:48] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[12:56:52] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[12:56:56] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[12:56:59] <Bender> [PhysOrg] - For this nanocatalyst reaction, one atom makes a big difference - http://phys.org
[12:57:00] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[12:57:03] <Bender> [PhysOrg] - Japan unveils stealth plane, may combine with next-gen jet - http://phys.org
[12:57:04] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[12:57:08] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[12:57:12] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[12:57:16] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[12:57:20] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[12:57:24] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[12:57:28] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[12:57:32] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[12:57:36] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[12:57:40] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[12:57:44] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[12:57:48] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[12:57:52] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[12:57:56] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[12:58:00] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[12:58:04] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[12:58:08] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[12:58:12] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[12:58:16] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[12:58:20] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[12:58:24] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[12:58:28] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[12:58:32] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[12:58:36] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[12:58:40] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[12:58:44] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[12:58:48] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[12:58:52] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[12:58:56] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[12:59:00] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[12:59:04] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[12:59:08] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[12:59:12] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[12:59:16] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[12:59:20] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[12:59:24] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[12:59:28] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[12:59:32] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[12:59:36] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[12:59:40] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[12:59:44] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[12:59:48] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[12:59:52] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[12:59:56] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[13:00:00] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[13:00:05] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[13:00:09] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[13:00:13] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[13:00:17] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[13:00:21] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[13:00:25] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[13:00:29] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[13:00:33] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[13:00:37] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[13:00:41] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[13:00:45] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[13:00:49] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[13:00:53] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[13:00:57] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[13:01:01] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[13:01:05] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[13:01:09] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[13:01:13] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[13:01:17] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[13:01:21] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[13:01:25] <Bender> [ForbesTech] - Fiat Chrysler Move Away From Cars May Pave The Way To The Future - http://www.forbes.com
[13:01:25] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[13:01:26] <Bender> [HackerNews] - Robert Greene, the First Bohemian - http://publicdomainreview.org
[13:01:29] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[13:01:33] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[13:01:37] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[13:01:41] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[13:01:45] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[13:01:47] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[13:01:49] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[13:01:51] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[13:01:53] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[13:01:55] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[13:01:57] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[13:01:59] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[13:02:01] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[13:02:03] <Bender> [PhysOrg] - VTT brings reflectors up to date with sensors and LED lights - http://phys.org
[13:02:03] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[13:02:05] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[13:02:07] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[13:02:09] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[13:02:11] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[13:02:13] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[13:02:14] <Bender> [TheRegister] - Feds slap Rentboy.com boss with further charges - http://go.theregister.com
[13:02:15] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[13:02:17] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[13:02:19] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[13:02:21] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[13:02:23] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[13:02:25] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[13:02:27] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[13:02:29] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[13:02:31] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[13:02:33] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[13:02:35] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[13:02:37] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[13:02:39] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[13:02:41] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[13:02:43] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[13:02:45] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[13:02:47] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[13:02:49] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[13:02:51] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[13:02:53] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[13:02:55] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[13:02:57] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[13:02:59] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[13:03:01] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[13:03:03] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[13:03:05] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[13:03:07] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[13:03:09] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[13:03:11] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[13:03:13] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[13:03:15] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[13:03:17] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[13:03:19] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[13:03:21] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[13:03:24] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[13:03:25] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[13:03:28] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[13:03:29] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[13:03:32] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[13:03:33] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[13:03:36] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[13:03:37] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[13:03:40] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[13:03:41] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[13:03:44] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[13:03:45] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[13:03:48] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[13:03:49] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[13:03:52] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[13:03:53] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[13:03:56] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[13:03:57] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[13:04:00] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[13:04:01] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[13:04:04] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[13:04:05] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[13:04:08] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[13:04:09] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[13:04:12] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[13:04:13] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[13:04:16] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[13:04:18] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[13:04:20] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[13:04:22] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[13:04:24] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[13:04:26] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[13:04:28] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[13:04:30] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[13:04:32] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[13:04:34] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[13:04:36] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[13:04:38] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[13:04:40] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[13:04:42] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[13:04:44] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[13:04:46] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[13:04:48] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[13:04:50] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[13:04:52] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[13:04:54] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[13:04:56] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[13:04:58] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[13:05:00] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[13:05:02] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[13:05:04] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[13:05:06] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[13:05:08] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[13:05:10] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[13:05:12] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[13:05:14] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[13:05:16] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[13:05:18] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[13:05:20] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[13:05:22] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[13:05:24] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[13:05:26] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[13:05:28] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[13:05:30] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[13:05:32] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[13:05:34] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[13:05:36] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[13:05:38] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[13:05:40] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[13:05:42] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[13:05:44] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[13:05:46] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[13:05:48] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[13:05:50] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[13:05:52] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[13:05:54] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[13:05:56] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[13:05:58] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[13:06:00] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[13:06:02] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[13:06:04] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[13:06:06] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[13:06:08] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[13:06:10] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[13:06:12] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[13:06:14] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[13:06:16] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[13:06:18] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[13:06:20] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[13:06:22] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[13:06:24] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[13:06:26] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[13:06:28] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[13:06:29] <Bender> [ForbesTech] - This Old iMac: Repairing Your Hard Drive - http://www.forbes.com
[13:06:30] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[13:06:31] Bytram|away is now known as Bytram
[13:06:32] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[13:06:34] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[13:06:38] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[13:06:42] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[13:06:46] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[13:06:50] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[13:06:51] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[13:06:54] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[13:06:55] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[13:06:58] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[13:06:59] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[13:07:02] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[13:07:03] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[13:07:06] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[13:07:07] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[13:07:10] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[13:07:11] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[13:07:14] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[13:07:15] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[13:07:18] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[13:07:19] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[13:07:22] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[13:07:23] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[13:07:26] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[13:07:27] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[13:07:30] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[13:07:31] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[13:07:34] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[13:07:35] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[13:07:38] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[13:07:39] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[13:07:42] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[13:07:43] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[13:07:46] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[13:07:47] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[13:07:50] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[13:07:51] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[13:07:54] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[13:07:55] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[13:07:58] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[13:07:59] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[13:08:02] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[13:08:03] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[13:08:06] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[13:08:07] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[13:08:10] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[13:08:11] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[13:08:14] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[13:08:15] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[13:08:18] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[13:08:19] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[13:08:22] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[13:08:23] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[13:08:26] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[13:08:27] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[13:08:30] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[13:08:31] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[13:08:34] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[13:08:38] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[13:08:42] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[13:08:46] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[13:08:50] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[13:08:54] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[13:08:58] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[13:09:02] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[13:09:06] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[13:09:11] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[13:09:15] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[13:09:19] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[13:09:23] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[13:09:27] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[13:09:31] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[13:09:35] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[13:09:39] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[13:09:43] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[13:09:47] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[13:09:51] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[13:09:55] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[13:09:59] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[13:10:03] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[13:10:07] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[13:10:11] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[13:10:15] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[13:10:19] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[13:10:23] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[13:10:27] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[13:10:31] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[13:10:35] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[13:10:39] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[13:10:43] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[13:10:47] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[13:10:51] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[13:10:55] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[13:10:59] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[13:11:03] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[13:11:07] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[13:11:11] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[13:11:15] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[13:11:18] <Bender> [ArsTechnica] - City cops in Disneyland’s backyard have had “stingray on steroids” for years - http://arstechnica.com
[13:11:19] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[13:11:23] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[13:11:27] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[13:11:31] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[13:11:34] <Bender> [HackerNews] - Hiring: Senior Software Engineer to Scale Global Marketplace (NYC) - http://www.shoptiques.com
[13:11:35] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[13:11:39] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[13:11:39] <Bender> [InnovationsReport] - LZH contributing to research priority „Hybrid Numerical Optics” - http://www.innovations-report.com
[13:11:43] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[13:11:43] <Bender> [InnovationsReport] - Identifying Another Piece in the Parkinson's Disease Pathology Puzzle - http://www.innovations-report.com
[13:11:47] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[13:11:47] <Bender> [InnovationsReport] - What Are The Special Properties Of An Atomic Gas? - http://www.innovations-report.com
[13:11:51] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[13:11:51] <Bender> [InnovationsReport] - Proposal for the assessment of new methods in plant breeding - http://www.innovations-report.com
[13:11:55] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[13:11:55] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[13:11:59] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[13:11:59] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[13:12:03] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[13:12:03] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[13:12:07] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[13:12:10] <Bender> [PhysOrg] - GPM: Making science fun for kids through comics - http://phys.org
[13:12:11] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[13:12:14] <Bender> [PhysOrg] - Megafauna mega-issues - http://phys.org
[13:12:15] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[13:12:19] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[13:12:23] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[13:12:27] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[13:12:31] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[13:12:35] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[13:12:39] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[13:12:43] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[13:12:47] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[13:12:51] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[13:12:55] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[13:12:59] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[13:13:03] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[13:13:07] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[13:13:11] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[13:16:36] <Bender> [ForbesTech] - SAPVoice: Where Are All The Women In Tech? - http://www.forbes.com
[13:16:59] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[13:21:34] <Bender> [CNET] - It's Data Privacy Day. Do you know where your data is? - CNET - http://feedproxy.google.com
[13:21:42] <Bender> [HackerNews] - MS' error message equivalent of F YOU - http://answers.microsoft.com
[13:22:18] <Bender> [PhysOrg] - What's a teacher's tipping point? Study researches teachers' reasons to refer anxious children - http://phys.org
[13:26:44] <Bender> [ForbesTech] - Galaxy S6 vs iPhone 6 - http://www.forbes.com
[13:26:46] <Bender> [HackerNews] - Michigan’s Great Stink - http://www.nytimes.com
[13:26:48] <Bender> [ForbesTech] - iPhone 5SE Versus Galaxy S7:Apple And Samsung's Royal Rumble - http://www.forbes.com
[13:26:50] <Bender> [HackerNews] - New Clues to How the Brain Maps Time - https://www.quantamagazine.org
[13:27:06] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[13:31:36] <Bender> [BBCTech] - BT 'failing' on new home broadband - http://www.bbc.co.uk
[13:31:50] <Bender> [HackerNews] - Transactional Memory Support for C [pdf] - http://www.open-std.org
[13:31:55] <Bender> [InnovationsReport] - Simplifying solar cells with a new mix of materials - http://www.innovations-report.com
[13:31:59] <Bender> [InnovationsReport] - Study finds toxic pollutants in fish across the world's oceans - http://www.innovations-report.com
[13:32:26] <Bender> [PhysOrg] - CERN upgrade to require removing thousands of old unused cables - http://phys.org
[13:32:30] <Bender> [ScienceDaily] - For this nanocatalyst reaction, one atom makes a big difference - http://www.sciencedaily.com
[13:32:30] <Bender> [PhysOrg] - Apple's iPhone is slumping. What's next? - http://phys.org
[13:36:39] <Bender> [BBCTech] - Will you like Facebook's new emotions? - http://www.bbc.co.uk
[13:36:52] <Bender> [ForbesTech] - AMD: The Year 2015 In Review - http://www.forbes.com
[13:36:53] <Bender> [HackerNews] - Nim in Action is now available - http://nim-lang.org
[13:36:56] <Bender> [ForbesTech] - Microsoft Earnings Preview: Cloud Revenue To Increase, OS Revenue To Falter - http://www.forbes.com
[13:37:30] <Bender> [PhysOrg] - New method for testing salinity tolerance in cereals - http://phys.org
[13:37:41] <Bender> [TheRegister] - There's 2no guidance for Scottish police use of UK facial recog database - http://go.theregister.com
[13:41:44] <Bender> [BBCTech] - Will you like Facebook's new Reactions? - http://www.bbc.co.uk
[13:41:57] <Bender> [HackerNews] - A Quicker Study on Tokenising - http://tcbrindle.github.io
[13:42:34] <Bender> [PhysOrg] - 30 years since Challenger: New voice at astronauts' memorial - http://phys.org
[13:42:38] <Bender> [PhysOrg] - Corals, crochet and the cosmos: how hyperbolic geometry pervades the universe - http://phys.org
[13:47:04] <Bender> [ITWorld] - Oracle is planning to kill an attacker's favorite: the Java browser plug-in - http://www.itworld.com
[13:47:23] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[13:47:27] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[13:47:31] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[13:47:35] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[13:47:39] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[13:47:43] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[13:47:47] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[13:47:51] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[13:47:55] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[13:47:59] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[13:48:03] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[13:48:07] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[13:48:11] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[13:48:15] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[13:48:19] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[13:48:23] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[13:48:27] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[13:48:31] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[13:48:35] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[13:48:39] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[13:48:43] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[13:48:47] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[13:48:51] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[13:48:55] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[13:48:59] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[13:49:03] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[13:49:07] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[13:49:11] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[13:49:15] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[13:49:19] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[13:49:23] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[13:49:27] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[13:49:31] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[13:49:35] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[13:49:39] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[13:49:43] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[13:49:47] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[13:49:51] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[13:49:55] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[13:49:59] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[13:50:03] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[13:50:07] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[13:50:11] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[13:50:16] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[13:50:20] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[13:50:24] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[13:50:28] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[13:50:32] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[13:50:36] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[13:50:40] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[13:50:44] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[13:50:48] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[13:50:52] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[13:50:56] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[13:51:00] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[13:51:04] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[13:51:08] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[13:51:12] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[13:51:16] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[13:51:20] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[13:51:24] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[13:51:28] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[13:51:32] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[13:51:36] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[13:51:40] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[13:51:44] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[13:51:48] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[13:51:52] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[13:51:56] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[13:52:00] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[13:52:04] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[13:52:05] <Bender> [HackerNews] - Beyond Corp: A New Approach to Enterprise Security (2014) [pdf] - https://www.usenix.org
[13:52:07] <Bender> [ITWorld] - New Android ransomware uses clickjacking to gain admin privileges - http://www.itworld.com
[13:52:08] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[13:52:12] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[13:52:16] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[13:52:20] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[13:52:24] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[13:52:26] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[13:52:28] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[13:52:30] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[13:52:32] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[13:52:34] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[13:52:36] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[13:52:38] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[13:52:40] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[13:52:41] <Bender> [PhysOrg] - The mysterious cataclysmic variable star Mu Centauri - http://phys.org
[13:52:42] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[13:52:44] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[13:52:45] <Bender> [PhysOrg] - Imaging technology could help combat a disease that endangers millions of the ocean's creatures - http://phys.org
[13:52:46] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[13:52:47] <Bender> [SecurityWeek] - LG Patches Severe Smartphone Hijack Vulnerability - http://feedproxy.google.com
[13:52:48] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[13:52:50] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[13:52:51] <Bender> [SecurityWeek] - Oracle to Kill Java Browser Plugin - http://feedproxy.google.com
[13:52:52] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[13:52:54] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[13:52:56] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[13:52:58] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[13:53:00] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[13:53:02] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[13:53:04] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[13:53:06] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[13:53:08] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[13:53:10] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[13:53:12] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[13:53:14] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[13:53:16] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[13:53:18] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[13:53:20] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[13:53:22] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[13:53:24] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[13:53:26] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[13:53:28] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[13:53:30] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[13:53:32] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[13:53:34] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[13:53:36] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[13:53:38] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[13:53:40] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[13:53:42] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[13:53:44] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[13:53:46] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[13:53:48] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[13:53:50] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[13:53:52] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[13:53:54] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[13:53:56] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[13:53:58] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[13:54:00] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[13:54:02] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[13:54:04] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[13:54:06] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[13:54:08] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[13:54:10] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[13:54:12] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[13:54:14] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[13:54:16] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[13:54:18] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[13:54:20] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[13:54:22] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[13:54:24] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[13:54:26] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[13:54:28] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[13:54:30] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[13:54:32] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[13:54:34] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[13:54:36] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[13:54:38] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[13:54:40] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[13:54:42] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[13:54:44] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[13:54:46] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[13:54:48] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[13:54:50] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[13:54:53] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[13:54:54] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[13:54:57] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[13:54:58] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[13:55:01] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[13:55:02] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[13:55:05] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[13:55:06] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[13:55:09] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[13:55:10] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[13:55:13] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[13:55:14] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[13:55:17] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[13:55:18] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[13:55:21] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[13:55:22] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[13:55:25] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[13:55:26] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[13:55:29] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[13:55:30] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[13:55:33] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[13:55:34] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[13:55:37] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[13:55:38] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[13:55:41] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[13:55:43] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[13:55:45] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[13:55:47] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[13:55:49] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[13:55:51] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[13:55:53] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[13:55:55] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[13:55:57] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[13:55:59] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[13:56:01] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[13:56:03] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[13:56:05] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[13:56:07] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[13:56:09] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[13:56:11] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[13:56:13] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[13:56:15] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[13:56:17] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[13:56:19] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[13:56:21] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[13:56:23] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[13:56:25] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[13:56:27] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[13:56:29] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[13:56:31] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[13:56:33] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[13:56:35] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[13:56:37] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[13:56:39] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[13:56:41] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[13:56:43] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[13:56:45] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[13:56:47] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[13:56:49] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[13:56:51] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[13:56:53] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[13:56:55] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[13:56:57] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[13:56:59] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[13:57:01] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[13:57:03] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[13:57:05] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[13:57:07] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[13:57:09] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[13:57:11] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[13:57:13] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[13:57:17] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[13:57:21] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[13:57:25] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[13:57:29] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[13:57:33] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[13:57:37] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[13:57:41] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[13:57:45] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[13:57:49] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[13:57:53] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[13:57:56] <Bender> [TheRegister] - SanDisk struggles to fatten itself up ahead of WD takeover - http://go.theregister.com
[13:57:57] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[13:58:01] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[13:58:05] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[13:58:09] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[13:58:13] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[13:58:17] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[13:58:21] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[13:58:25] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[13:58:29] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[13:58:33] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[13:58:37] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[13:58:41] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[13:58:45] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[13:58:49] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[13:58:53] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[13:58:57] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[13:59:01] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[13:59:05] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[13:59:09] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[13:59:14] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[13:59:18] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[13:59:22] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[13:59:26] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[13:59:30] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[13:59:34] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[13:59:38] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[13:59:42] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[13:59:46] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[13:59:50] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[13:59:54] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[13:59:58] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[14:00:02] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[14:00:06] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[14:00:10] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[14:00:14] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[14:00:18] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[14:00:22] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[14:00:26] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[14:00:30] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[14:00:34] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[14:00:38] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[14:00:42] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[14:00:46] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[14:00:50] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[14:00:54] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[14:00:58] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[14:01:02] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[14:01:06] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[14:01:10] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[14:01:14] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[14:01:18] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[14:01:22] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[14:01:26] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[14:01:30] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[14:01:34] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[14:01:38] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[14:01:42] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[14:01:46] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[14:01:50] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[14:01:54] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[14:01:58] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[14:02:02] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[14:02:03] <Bender> [Bugtraq] - Bugtraq: HCA0005 - Liberty Global - Horizon HD STB - predictable WiFi passphrase - http://www.securityfocus.com
[14:02:06] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[14:02:10] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[14:02:14] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[14:02:15] <Bender> [ITWorld] - EU Commissioner: Please ask me to investigate Google’s tax affairs - http://www.itworld.com
[14:02:18] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[14:02:22] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[14:02:26] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[14:02:30] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[14:02:34] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[14:02:34] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[14:02:38] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[14:02:38] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[14:02:42] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[14:02:42] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[14:02:46] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[14:02:46] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[14:02:49] <Bender> [PhysOrg] - Bedbugs develop resistance to widely used chemical treatments, rendering them ineffective - http://phys.org
[14:02:50] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[14:02:50] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[14:02:53] <Bender> [PhysOrg] - Physicists split on ideas expressed in Hawking's latest black hole paper - http://phys.org
[14:02:54] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[14:02:54] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[14:02:58] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[14:02:58] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[14:03:02] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[14:03:02] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[14:03:06] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[14:03:06] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[14:03:10] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[14:03:10] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[14:03:14] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[14:03:14] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[14:03:18] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[14:03:18] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[14:03:22] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[14:03:22] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[14:03:26] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[14:03:26] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[14:03:30] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[14:03:30] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[14:03:34] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[14:03:34] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[14:03:38] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[14:03:39] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[14:03:42] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[14:03:43] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[14:03:46] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[14:03:47] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[14:03:50] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[14:03:51] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[14:03:54] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[14:03:58] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[14:04:02] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[14:04:06] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[14:04:10] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[14:04:14] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[14:07:01] <Bender> [ArsTechnica] - Hey, Valve: What’s the point of Steam OS? - http://arstechnica.com
[14:07:15] <Bender> [ForbesTech] - Five 2016 Lego Sets Aping The Video-Game Play-Book - http://www.forbes.com
[14:07:17] <Bender> [HackerNews] - Analyzo: Find and Compare the Best Tools for your Startup - http://www.analyzo.com
[14:07:19] <Bender> [ForbesTech] - Shryne Shares Bigger Vision With 2.0 Launch - http://www.forbes.com
[14:07:23] <Bender> [ForbesTech] - The Business Books Every Technology Leader Should Have In The Office - http://www.forbes.com
[14:07:37] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[14:07:41] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[14:07:45] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[14:09:14] <Bender> [Threatpost] - Java Serialization Bug Crops Up At PayPal - http://threatpost.com
[14:12:05] <Bender> [ArsTechnica] - Zotac’s new Steam OS box isn’t worth the headaches - http://arstechnica.com
[14:12:12] Bytram is now known as Bytram|away
[14:12:41] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[14:13:01] <Bender> [ScienceDaily] - Electric patch holds promise for treating PTSD - http://www.sciencedaily.com
[14:14:24] <Bender> [WiredScience] - Gerrymandering Is Even More Infuriating When You Can Actually See It - http://feeds.wired.com
[14:17:45] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[14:18:07] <Bender> [SecurityWeek] - VirusTotal Now Scans Firmware Images - http://feedproxy.google.com
[14:22:33] <Bender> [InnovationsReport] - Novel nanotechnology technique makes table-top production of flat optics a reality - http://www.innovations-report.com
[14:22:37] <Bender> [InnovationsReport] - Nano-coating makes coaxial cables lighter - http://www.innovations-report.com
[14:22:41] <Bender> [InnovationsReport] - NASA Webb Telescope mirrors installed with robotic arm precision - http://www.innovations-report.com
[14:23:04] <Bender> [PhysOrg] - Def Leppard debuts video through game - http://phys.org
[14:23:08] <Bender> [ScienceDaily] - Toxic pollutants found in fish across the world's oceans - http://www.sciencedaily.com
[14:23:08] <Bender> [PhysOrg] - EU considering probe of Google tax deal in UK - http://phys.org
[14:23:12] <Bender> [ScienceDaily] - Toward a better understanding of the mechanisms blocking cancer cell growth - http://www.sciencedaily.com
[14:23:12] <Bender> [PhysOrg] - Enormous blades could lead to more offshore energy in US - http://phys.org
[14:27:30] <Bender> [ForbesTech] - 5 Features The Samsung Galaxy S7 Will Need - http://www.forbes.com
[14:28:12] <Bender> [ScienceDaily] - Daughters of interracial parents more likely than sons to identify as multiracial - http://www.sciencedaily.com
[14:28:16] <Bender> [ScienceDaily] - Chronic pain changes our immune systems - http://www.sciencedaily.com
[14:28:19] <Bender> [TheRegister] - Samsung: Is gadget lust still a thing in 2016? Nope - http://go.theregister.com
[14:30:19] <Bender> [Nautilus] - The Man Who Would Tame Cancer - Issue 32: Space - http://nautil.us || The Bugs in Our Mindware - Issue 32: Space - http://nautil.us || Ingenious: - 3 more
[14:32:34] <Bender> [ForbesTech] - Useful Apps To Learn Design And Coding On Your Smartphone - http://www.forbes.com
[14:33:12] <Bender> [PhysOrg] - Fast-moving invisibility cloaks become visible - http://phys.org
[14:42:28] <Bender> [ArsTechnica] - LG closes data-theft hole affecting millions of G3 smartphones - http://arstechnica.com
[14:42:42] <Bender> [ForbesTech] - iPhone 5SE Versus Galaxy S7, Apple And Samsung's Royal Rumble - http://www.forbes.com
[14:42:46] <Bender> [ForbesTech] - IBMVoice: How To Provide Mobile Experiences At Live Sports Events - http://www.forbes.com
[14:43:31] <Bender> [TheRegister] - Apple’s retail chief: ‘Touching customers’ key to retail success - http://go.theregister.com
[14:43:32] <Bender> [SoylentNews] - Subtle Vulnerabilities with PHP and cURL - http://sylnt.us
[14:47:46] <Bender> [ForbesTech] - Samsung Needs These 5 Features In The Galaxy S7 - http://www.forbes.com
[14:48:30] <Bender> [SecurityWeek] - Pindrop Security Raises $75 Million to Up Its Fight Against Phone Fraud - http://feedproxy.google.com
[14:52:51] <Bender> [HackerNews] - Global GPS Time Anomaly on Tue, Jan 26th - https://www.meinbergglobal.com
[14:53:38] <Bender> [TheRegister] - Former tech PR Jeremy Hunt MP ordered by judge to delete tweet - http://go.theregister.com
[14:57:53] <Bender> [ForbesTech] - Judicial Redress Act 'National Security Interests' Amendment Could Distrupt US-EU Negotiations - http://www.forbes.com
[14:57:55] <Bender> [HackerNews] - The “Cobra Effect” that is disabling paste on password fields - http://www.troyhunt.com
[15:02:49] <Bender> [Bugtraq] - Bugtraq: Trend Micro Direct Pass - Filter Bypass & Persistent Web Vulnerability - http://www.securityfocus.com
[15:02:53] <Bender> [Bugtraq] - Bugtraq: New Era Company CMS - (id) SQL Injection Vulnerability - http://www.securityfocus.com
[15:02:57] <Bender> [ForbesTech] - Imergy Accelerates Deployment Of Flow Batteries In Global Markets - http://www.forbes.com
[15:03:20] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[15:03:24] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[15:03:28] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[15:03:32] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[15:03:36] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[15:03:40] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[15:03:44] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[15:03:48] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[15:03:52] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[15:03:56] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[15:04:00] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[15:04:04] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[15:04:08] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[15:04:12] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[15:04:16] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[15:04:20] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[15:04:24] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[15:04:28] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[15:04:32] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[15:04:36] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[15:04:40] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[15:04:44] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[15:04:48] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[15:04:52] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[15:04:56] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[15:04:57] <Bender> [Threatpost] - Jon Callas on Securing Our Private Data - http://threatpost.com
[15:05:00] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[15:05:04] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[15:05:08] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[15:05:12] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[15:05:16] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[15:05:20] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[15:05:24] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[15:05:28] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[15:05:32] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[15:05:36] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[15:05:40] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[15:05:44] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[15:05:48] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[15:05:52] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[15:05:56] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[15:06:00] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[15:06:04] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[15:06:08] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[15:06:12] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[15:06:16] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[15:06:20] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[15:06:24] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[15:06:28] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[15:06:32] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[15:06:36] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[15:06:40] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[15:06:44] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[15:06:48] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[15:06:52] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[15:06:56] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[15:07:00] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[15:07:04] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[15:07:08] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[15:07:12] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[15:07:16] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[15:07:21] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[15:07:25] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[15:07:29] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[15:07:33] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[15:07:37] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[15:07:41] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[15:07:45] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[15:07:47] <Bender> [ArsTechnica] - Crows: The tail-pulling, food-stealing bird prodigies - http://arstechnica.com
[15:07:49] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[15:07:53] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[15:07:57] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[15:08:01] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[15:08:01] <Bender> [ForbesTech] - Five 2016 Lego Sets That Wouldn't Exist Without Video-Games - http://www.forbes.com
[15:08:03] <Bender> [HackerNews] - George-Eugène Haussmann, the man who created Paris - http://www.bbc.com
[15:08:05] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[15:08:05] <Bender> [ForbesTech] - PRS For Music CEO, Robert Ashcroft, Discusses Challenges and Innovations In Music Collection - http://www.forbes.com
[15:08:09] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[15:08:09] <Bender> [ForbesTech] - An Idea For Making Solar and Utilities Friends: Solar + TOU - http://www.forbes.com
[15:08:13] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[15:08:17] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[15:08:21] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[15:08:23] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[15:08:25] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[15:08:27] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[15:08:29] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[15:08:32] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[15:08:33] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[15:08:36] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[15:08:37] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[15:08:40] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[15:08:41] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[15:08:44] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[15:08:45] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[15:08:48] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[15:08:49] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[15:08:50] <Bender> [TheRegister] - Pay up, Lincolnshire, or your data gets it. Systems still down after Cryptolocker hits - http://go.theregister.com
[15:08:52] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[15:08:53] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[15:08:56] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[15:08:57] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[15:09:00] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[15:09:01] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[15:09:04] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[15:09:05] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[15:09:08] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[15:09:09] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[15:09:12] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[15:09:13] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[15:09:16] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[15:09:17] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[15:09:20] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[15:09:21] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[15:09:24] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[15:09:25] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[15:09:28] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[15:09:29] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[15:09:32] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[15:09:33] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[15:09:36] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[15:09:37] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[15:09:40] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[15:09:41] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[15:09:44] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[15:09:45] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[15:09:48] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[15:09:49] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[15:09:52] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[15:09:53] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[15:09:56] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[15:09:57] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[15:10:00] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[15:10:01] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[15:10:04] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[15:10:05] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[15:10:08] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[15:10:09] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[15:10:12] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[15:10:13] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[15:10:16] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[15:10:17] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[15:10:20] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[15:10:21] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[15:10:24] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[15:10:25] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[15:10:28] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[15:10:29] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[15:10:32] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[15:10:33] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[15:10:36] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[15:10:37] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[15:10:40] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[15:10:41] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[15:10:44] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[15:10:45] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[15:10:48] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[15:10:49] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[15:10:52] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[15:10:53] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[15:10:56] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[15:10:57] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[15:11:00] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[15:11:01] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[15:11:04] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[15:11:05] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[15:11:08] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[15:11:09] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[15:11:12] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[15:11:13] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[15:11:16] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[15:11:17] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[15:11:20] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[15:11:21] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[15:11:24] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[15:11:25] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[15:11:28] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[15:11:29] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[15:11:32] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[15:11:33] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[15:11:36] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[15:11:37] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[15:11:40] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[15:11:41] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[15:11:44] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[15:11:45] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[15:11:48] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[15:11:49] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[15:11:52] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[15:11:54] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[15:11:56] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[15:11:58] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[15:12:00] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[15:12:02] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[15:12:04] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[15:12:06] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[15:12:08] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[15:12:10] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[15:12:12] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[15:12:14] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[15:12:16] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[15:12:18] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[15:12:20] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[15:12:22] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[15:12:24] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[15:12:26] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[15:12:28] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[15:12:30] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[15:12:32] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[15:12:34] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[15:12:36] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[15:12:38] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[15:12:40] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[15:12:42] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[15:12:44] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[15:12:46] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[15:12:48] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[15:12:50] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[15:12:52] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[15:12:54] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[15:12:56] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[15:12:58] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[15:13:00] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[15:13:02] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[15:13:04] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[15:13:05] <Bender> [ForbesTech] - It's A New Day For 'Destiny' As Pete Parsons Takes Over As Bungie CEO - http://www.forbes.com
[15:13:06] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[15:13:07] <Bender> [HackerNews] - The Challenger Explosion, 30 Years Later - http://www.nytimes.com
[15:13:09] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[15:13:09] <Bender> [ForbesTech] - MedidataVoice: Time for Pharma To Catch Up With FDA - http://www.forbes.com
[15:13:10] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[15:13:14] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[15:13:18] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[15:13:22] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[15:13:26] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[15:13:27] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[15:13:30] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[15:13:31] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[15:13:34] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[15:13:35] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[15:13:38] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[15:13:39] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[15:13:42] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[15:13:43] <Bender> [PhysOrg] - World's oldest tea found in Chinese emperor's tomb - http://phys.org
[15:13:43] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[15:13:46] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[15:13:47] <Bender> [PhysOrg] - Reconfigurable origami tubes could find antenna, microfluidic uses - http://phys.org
[15:13:47] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[15:13:50] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[15:13:51] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[15:13:54] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[15:13:55] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[15:13:58] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[15:13:59] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[15:14:02] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[15:14:03] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[15:14:06] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[15:14:07] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[15:14:10] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[15:14:11] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[15:14:14] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[15:14:15] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[15:14:18] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[15:14:19] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[15:14:22] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[15:14:24] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[15:14:26] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[15:14:28] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[15:14:30] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[15:14:32] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[15:14:34] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[15:14:36] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[15:14:38] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[15:14:40] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[15:14:42] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[15:14:44] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[15:14:46] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[15:14:48] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[15:14:50] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[15:14:52] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[15:14:54] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[15:14:56] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[15:14:58] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[15:15:00] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[15:15:02] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[15:15:04] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[15:15:06] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[15:15:08] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[15:15:10] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[15:15:14] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[15:15:18] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[15:15:22] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[15:15:26] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[15:15:30] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[15:15:34] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[15:15:38] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[15:15:42] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[15:15:46] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[15:15:50] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[15:15:54] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[15:15:58] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[15:16:02] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[15:16:06] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[15:16:10] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[15:16:14] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[15:16:18] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[15:16:22] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[15:16:26] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[15:16:30] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[15:16:35] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[15:16:39] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[15:16:43] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[15:16:47] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[15:16:51] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[15:16:55] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[15:16:59] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[15:17:03] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[15:17:07] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[15:17:11] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[15:17:15] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[15:17:19] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[15:17:23] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[15:17:27] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[15:17:31] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[15:17:35] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[15:17:39] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[15:17:43] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[15:17:47] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[15:17:51] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[15:17:55] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[15:17:59] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[15:18:03] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[15:18:07] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[15:18:11] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[15:18:15] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[15:18:19] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[15:18:23] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[15:18:27] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[15:18:31] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[15:18:31] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[15:18:35] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[15:18:35] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[15:18:39] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[15:18:39] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[15:18:43] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[15:18:47] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[15:18:51] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[15:18:55] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[15:18:59] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[15:19:03] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[15:19:07] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[15:19:11] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[15:19:15] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[15:19:19] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[15:19:23] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[15:19:27] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[15:19:31] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[15:19:35] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[15:19:39] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[15:19:43] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[15:19:47] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[15:23:00] <Bender> [BBCTech] - Java browser plug-in to be retired - http://www.bbc.co.uk
[15:23:51] <Bender> [PhysOrg] - Scholars look to early 20th century radio technology to help improve Internet security - http://phys.org
[15:23:55] <Bender> [PhysOrg] - Antarctic fungi survive Martian conditions on the International Space Station - http://phys.org
[15:23:59] <Bender> [PhysOrg] - Bringing time and space together for universal symmetry - http://phys.org
[15:24:03] <Bender> [PhysOrg] - Breakthrough enables ultra-fast transport of electrical charges in polymers - http://phys.org
[15:24:07] <Bender> [PhysOrg] - How queen bees control the princesses - http://phys.org
[15:28:16] <Bender> [ForbesTech] - Five 2016 Lego Sets That Wouldn't Exist Without Video Games - http://www.forbes.com
[15:28:19] <Bender> [HackerNews] - Pyjion – A JIT for Python based upon CoreCLR - http://sylnt.us
[15:28:23] <Bender> [HackerNews] - OpenSSL Security Advisory [28th Jan 2016] - https://mta.openssl.org
[15:28:39] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[15:28:54] <Bender> [PhysOrg] - Sensing the future of molecule detection and bioproduction - http://phys.org
[15:28:58] <Bender> [PhysOrg] - Harnessing the oxidising power of air - http://phys.org
[15:29:02] <Bender> [PhysOrg] - Vaccine study shapes plan to wipe out rabies in free-roaming dogs - http://phys.org
[15:29:05] <Bender> [TheRegister] - You've seen things people wouldn't believe – so tell us your programming horrors - http://go.theregister.com
[15:33:22] <Bender> [HackerNews] - GitMask: Develop anonymously - http://www.gitmask.com
[15:33:26] <Bender> [HackerNews] - Share 360° Panosphere Images on Facebook and YouTube - http://climbcodecreate.com
[15:33:30] <Bender> [HackerNews] - Exploring two decades of transport layer insecurity - https://koeln.media.ccc.de
[15:33:34] <Bender> [HackerNews] - Large-scale conspiracies would quickly reveal themselves - http://www.ox.ac.uk
[15:33:39] <Bender> [HackerNews] - How to do really secure authentication in 872 lines of PHP code - http://sylnt.us
[15:33:43] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[15:38:26] <Bender> [HackerNews] - Compressed representations in the age of big data - https://www.oreilly.com
[15:38:30] <Bender> [HackerNews] - Hacking an Image-Based Recommender System - http://datajet.io
[15:39:02] <Bender> [PhysOrg] - EU considering probe of Google tax deal in UK (Update) - http://phys.org
[15:39:06] <Bender> [ScienceDaily] - Multiple sclerosis drug tied to rising JC virus antibody levels - http://www.sciencedaily.com
[15:39:06] <Bender> [PhysOrg] - Too-few proteins prompt nanoparticles to clump - http://phys.org
[15:39:13] <Bender> [TheRegister] - Pay up, Lincolnshire, or your data gets it. Systems still down after ransomware hits - http://go.theregister.com
[15:44:17] <Bender> [TheRegister] - Pivot3 pivots, buys NexGen - http://go.theregister.com
[15:48:42] <Bender> [MITTech] - Four Factors for Successful Entrepreneurial Negotiations - http://www.technologyreview.com
[15:49:14] <Bender> [ScienceDaily] - Opioid prescribing for chronic pain: Achieving the right balance through education - http://www.sciencedaily.com
[15:49:18] <Bender> [ScienceDaily] - Gene study points towards therapies for common brain disorders - http://www.sciencedaily.com
[15:49:22] <Bender> [ScienceDaily] - CRISPR used to repair blindness-causing genetic defect in patient-derived stem cells - http://www.sciencedaily.com
[15:53:37] <Bender> [HackerNews] - Timezone updates need to be fixed - http://www.creativedeletion.com
[15:54:18] <Bender> [ScienceDaily] - Incentive pay not motivating enough for some managers - http://www.sciencedaily.com
[15:54:22] <Bender> [ScienceDaily] - Feeling spaces with the 'proximity hat' - http://www.sciencedaily.com
[15:58:40] <Bender> [ForbesTech] - How Facebook Turned Its Greatest Weakness Into Its Greatest Strength - http://www.forbes.com
[15:58:41] <Bender> [HackerNews] - Robomongo needs over $100k to continue - http://robomongo.org
[15:58:45] <Bender> [HackerNews] - Systems Esthetics (1968) - http://www.arts.ucsb.edu
[15:59:24] <Bender> [SecurityWeek] - Attackers Use Word Docs to Deliver BlackEnergy Malware - http://feedproxy.google.com
[16:00:36] <Bender> [SingularityHub] - Why We Should Use Behavioral Economics to Design Technology That Doesn’t Kill Us - http://singularityhub.com
[16:03:29] <Bender> [ArsTechnica] - The first pieces of useful smart clothing will tackle body temperature - http://arstechnica.com
[16:03:31] <Bender> [BBCTech] - US parents warned on hacked baby webcams - http://www.bbc.co.uk
[16:04:25] <Bender> [ScienceDaily] - New programs help prepare low-income children for school success - http://www.sciencedaily.com
[16:04:29] <Bender> [ScienceDaily] - Growth factor in brain tied to slower mental decline - http://www.sciencedaily.com
[16:04:32] <Bender> [TheRegister] - AI no longer needs to fake it. Just don't try talking to your robots - http://go.theregister.com
[16:04:33] <Bender> [ScienceDaily] - Andean bean: Small bean for sweet dreams - http://www.sciencedaily.com
[16:08:42] <Bender> [CNET] - How to buy the best car for your family - Roadshow - http://feedproxy.google.com
[16:08:43] <Bender> [ComputerWorld] - Watchup proves Apple is winning the TV show - http://rss.computerworld.com
[16:08:46] <Bender> [CNET] - OnePlus X, the hottest phone you've never heard of, now widely available - CNET - http://feedproxy.google.com
[16:08:49] <Bender> [HackerNews] - RabbitMQ Internals - http://sylnt.us
[16:08:53] <Bender> [HackerNews] - Tails 2.0 is out - https://tails.boum.org
[16:08:57] <Bender> [HackerNews] - F.C.C. Proposes Changes in Cable Set-Top Box Market - http://www.nytimes.com
[16:09:01] <Bender> [HackerNews] - Preact, fast 3kb React alternative - http://developit.github.io
[16:09:06] <Bender> [HackerNews] - Replace a running Debian installation by Arch remotely over ssh - http://sylnt.us
[16:13:37] <Bender> [ArsTechnica] - EA: We’re on a “journey to regain trust of the PC gamer” - http://arstechnica.com
[16:13:53] <Bender> [HackerNews] - The result would be a catastrophe - http://www.lettersofnote.com
[16:13:57] <Bender> [HackerNews] - Quickappicon - http://quickappicon.com
[16:14:42] <Bender> [SoylentNews] - Are You Fat? Blame Childhood Antibiotics - http://sylnt.us
[16:18:41] <Bender> [ArsTechnica] - Apple recalls two-prong AC adapter over shock risk - http://arstechnica.com
[16:18:57] <Bender> [HackerNews] - Docker Universal Control Plane - https://www.docker.com
[16:19:37] <Bender> [ScienceDaily] - Maya healers' conception of cancer may help bridge gap in multicultural settings care - http://www.sciencedaily.com
[16:20:55] <Bender> [Threatpost] - OpenSSL Patches Serious Flaw that Puts ‘Popular Applications’ At Risk - http://threatpost.com
[16:23:59] <Bender> [ForbesTech] - Here Are All The Free Games Coming To PlayStation Plus Next Month - http://www.forbes.com
[16:24:01] <Bender> [HackerNews] - Ask HN: How do I fire someone who has sensitive PII on their personal laptop? - https://news.ycombinator.com
[16:24:03] <Bender> [ForbesTech] - Here Are All The Free Games Coming To Xbox Live With Gold This February - http://www.forbes.com
[16:24:07] <Bender> [ForbesTech] - 5 Features I Want To See In The Samsung Galaxy S7 - http://www.forbes.com
[16:24:11] <Bender> [ForbesTech] - MedidataVoice: Time For Pharma To Catch Up With FDA - http://www.forbes.com
[16:24:15] <Bender> [ForbesTech] - Why We Risked Everything To Move to New York and Hunt Bigger Game - http://www.forbes.com
[16:24:19] <Bender> [ForbesTech] - Sixty New Species of Dragonflies Discovered in Africa - http://www.forbes.com
[16:24:41] <Bender> [ScienceDaily] - Transplant centers often reject potential donor livers for sickest patients in need - http://www.sciencedaily.com
[16:24:45] <Bender> [ScienceDaily] - Minorities had lower risk of coronary heart disease than whites, study shows - http://www.sciencedaily.com
[16:24:49] <Bender> [ScienceDaily] - Finding the right antithrombotic (anti-clotting) drug for you - http://www.sciencedaily.com
[16:24:53] <Bender> [ScienceDaily] - Smartphone app linked to increase in contraceptive use in India - http://www.sciencedaily.com
[16:24:57] <Bender> [ScienceDaily] - Calculating whiskers send precise information to the brain - http://www.sciencedaily.com
[16:26:47] Bytram|away is now known as Bytram
[16:29:04] <Bender> [HackerNews] - Snapdocs is looking for a battle-hardened rails engineer - https://news.ycombinator.com
[16:29:25] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[16:29:29] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[16:29:33] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[16:29:37] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[16:29:41] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[16:29:45] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[16:29:49] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[16:29:52] <Bender> [TheRegister] - Hell, high water, and ice: Facebook's Dublin data center choices - http://go.theregister.com
[16:29:53] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[16:29:57] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[16:30:01] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[16:30:05] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[16:30:09] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[16:30:13] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[16:30:17] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[16:30:21] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[16:30:25] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[16:30:29] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[16:30:33] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[16:30:37] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[16:30:41] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[16:30:45] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[16:30:49] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[16:30:53] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[16:30:57] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[16:31:01] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[16:31:05] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[16:31:09] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[16:31:14] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[16:31:18] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[16:31:22] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[16:31:26] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[16:31:30] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[16:31:34] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[16:31:38] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[16:31:42] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[16:31:46] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[16:31:50] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[16:31:54] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[16:31:58] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[16:32:02] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[16:32:06] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[16:32:10] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[16:32:14] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[16:32:18] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[16:32:22] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[16:32:26] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[16:32:30] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[16:32:34] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[16:32:38] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[16:32:42] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[16:32:46] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[16:32:50] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[16:32:54] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[16:32:58] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[16:33:02] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[16:33:06] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[16:33:10] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[16:33:14] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[16:33:18] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[16:33:22] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[16:33:26] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[16:33:30] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[16:33:34] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[16:33:38] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[16:33:42] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[16:33:46] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[16:33:50] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[16:33:54] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[16:33:58] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[16:34:02] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[16:34:06] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[16:34:08] <Bender> [HackerNews] - Seven Deadly Annoyances of API Design - http://chickenwing.software
[16:34:10] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[16:34:14] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[16:34:18] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[16:34:22] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[16:34:26] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[16:34:29] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[16:34:30] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[16:34:33] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[16:34:34] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[16:34:37] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[16:34:38] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[16:34:41] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[16:34:42] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[16:34:45] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[16:34:46] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[16:34:49] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[16:34:50] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[16:34:53] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[16:34:54] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[16:34:57] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[16:34:58] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[16:35:01] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[16:35:02] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[16:35:05] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[16:35:06] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[16:35:09] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[16:35:10] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[16:35:13] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[16:35:14] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[16:35:17] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[16:35:18] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[16:35:21] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[16:35:22] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[16:35:25] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[16:35:26] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[16:35:29] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[16:35:30] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[16:35:33] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[16:35:34] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[16:35:38] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[16:35:38] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[16:35:42] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[16:35:42] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[16:35:46] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[16:35:46] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[16:35:50] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[16:35:50] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[16:35:54] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[16:35:55] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[16:35:58] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[16:35:59] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[16:36:02] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[16:36:03] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[16:36:06] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[16:36:07] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[16:36:10] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[16:36:11] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[16:36:14] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[16:36:15] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[16:36:18] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[16:36:19] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[16:36:22] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[16:36:23] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[16:36:26] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[16:36:27] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[16:36:30] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[16:36:31] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[16:36:34] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[16:36:35] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[16:36:38] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[16:36:39] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[16:36:42] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[16:36:43] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[16:36:46] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[16:36:47] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[16:36:50] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[16:36:51] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[16:36:54] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[16:36:55] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[16:36:58] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[16:36:59] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[16:37:02] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[16:37:03] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[16:37:06] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[16:37:07] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[16:37:10] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[16:37:11] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[16:37:14] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[16:37:15] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[16:37:18] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[16:37:19] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[16:37:22] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[16:37:23] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[16:37:26] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[16:37:27] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[16:37:30] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[16:37:31] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[16:37:34] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[16:37:35] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[16:37:38] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[16:37:39] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[16:37:42] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[16:37:43] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[16:37:46] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[16:37:47] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[16:37:50] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[16:37:51] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[16:37:54] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[16:37:55] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[16:37:58] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[16:37:59] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[16:38:02] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[16:38:03] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[16:38:06] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[16:38:07] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[16:38:10] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[16:38:11] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[16:38:14] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[16:38:15] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[16:38:18] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[16:38:19] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[16:38:22] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[16:38:23] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[16:38:26] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[16:38:27] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[16:38:30] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[16:38:31] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[16:38:34] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[16:38:35] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[16:38:38] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[16:38:39] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[16:38:42] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[16:38:43] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[16:38:46] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[16:38:47] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[16:38:50] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[16:38:51] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[16:38:54] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[16:38:55] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[16:38:56] <Bender> [ArsTechnica] - Cable lobby is really mad about FCC’s set-top box competition plan - http://arstechnica.com
[16:38:58] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[16:38:59] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[16:39:02] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[16:39:03] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[16:39:06] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[16:39:07] <Bender> [ComputerWorld] - IDG Contributor Network: Growing the IoT: Chaos vs. Curation - http://rss.computerworld.com
[16:39:07] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[16:39:11] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[16:39:11] <Bender> [ForbesTech] - Why We Risked Everything To Move To New York And Hunt Bigger Game - http://www.forbes.com
[16:39:11] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[16:39:12] <Bender> [HackerNews] - The ‘infuriating’ saga of the Texas teen suspended after rescuing a classmate - https://www.washingtonpost.com
[16:39:15] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[16:39:15] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[16:39:19] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[16:39:23] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[16:39:27] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[16:39:31] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[16:39:35] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[16:39:39] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[16:39:43] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[16:39:47] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[16:39:51] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[16:39:55] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[16:40:00] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[16:40:04] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[16:40:08] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[16:40:12] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[16:40:16] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[16:40:20] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[16:40:24] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[16:40:28] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[16:40:32] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[16:40:36] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[16:40:40] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[16:40:44] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[16:40:48] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[16:40:52] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[16:40:56] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[16:41:00] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[16:41:04] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[16:41:08] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[16:41:12] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[16:41:16] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[16:41:20] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[16:41:24] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[16:41:28] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[16:41:32] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[16:41:36] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[16:41:40] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[16:41:44] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[16:41:48] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[16:41:52] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[16:41:56] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[16:42:00] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[16:42:04] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[16:42:08] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[16:42:12] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[16:42:16] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[16:42:20] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[16:42:24] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[16:42:28] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[16:42:32] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[16:42:36] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[16:42:40] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[16:42:44] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[16:42:48] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[16:42:52] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[16:42:56] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[16:43:00] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[16:43:04] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[16:43:08] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[16:43:12] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[16:43:16] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[16:43:20] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[16:43:24] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[16:43:28] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[16:43:32] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[16:43:36] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[16:43:40] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[16:43:44] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[16:43:48] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[16:43:52] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[16:43:56] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[16:44:00] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[16:44:05] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[16:44:09] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[16:44:13] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[16:44:16] <Bender> [HackerNews] - State of Clojure 2015: Survey Results - http://blog.cognitect.com
[16:44:17] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[16:44:21] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[16:44:25] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[16:44:29] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[16:44:33] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[16:44:37] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[16:44:37] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[16:44:41] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[16:44:41] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[16:44:45] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[16:44:45] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[16:44:49] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[16:44:49] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[16:44:53] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[16:44:53] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[16:44:56] <Bender> [ScienceDaily] - Emerging Zika pandemic requires more WHO action now - http://www.sciencedaily.com
[16:44:57] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[16:44:57] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[16:45:00] <Bender> [ScienceDaily] - Eating soy may protect women from health risks of BPA - http://www.sciencedaily.com
[16:45:01] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[16:45:01] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[16:45:05] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[16:45:05] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[16:45:09] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[16:45:09] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[16:45:13] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[16:45:13] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[16:45:17] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[16:45:17] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[16:45:21] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[16:45:21] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[16:45:25] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[16:45:25] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[16:45:29] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[16:45:29] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[16:45:33] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[16:45:33] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[16:45:37] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[16:45:37] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[16:45:41] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[16:45:41] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[16:45:45] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[16:45:45] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[16:45:49] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[16:45:49] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[16:45:53] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[16:45:53] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[16:45:57] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[16:46:01] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[16:46:05] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[16:46:09] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[16:46:13] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[16:46:17] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[16:47:01] -!- TheMightyBuzzard [TheMightyBuzzard!~TheMighty@Soylent/Staff/Developer/TMB] has joined #rss-bot
[16:47:26] -!- TheMightyBuzzard [TheMightyBuzzard!~TheMighty@Soylent/Staff/Developer/TMB] has parted #rss-bot
[16:49:04] <Bender> [ArsTechnica] - First-person drone racing is much harder than I expected - http://arstechnica.com
[16:49:20] <Bender> [HackerNews] - Proposal to require clinical trials data to be shared for publication - http://www.statnews.com
[16:49:28] <Bender> [MITTech] - How DARPA Took On the Twitter Bot Menace with One Hand Behind Its Back - http://www.technologyreview.com
[16:50:00] <Bender> [ScienceDaily] - Researchers mine the epigenome to identify likely origins of childhood brain tumor subtype - http://www.sciencedaily.com
[16:54:22] <Bender> [ForbesTech] - General Motors...A Car Sharing Maven? - http://www.forbes.com
[16:54:26] <Bender> [ITWorld] - Get set for a choice of flagship smartphones with Qualcomm's Snapdragon 820 chip - http://www.itworld.com
[16:54:30] <Bender> [ITWorld] - Verizon told to remove huge Super Bowl ad in San Francisco - http://www.itworld.com
[16:54:45] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[16:54:49] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[16:54:53] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[16:55:11] <Bender> [TheRegister] - Puppet master investors tug on Citrix as wind turns - http://go.theregister.com
[16:59:14] <Bender> [BBCTech] - Apple plug recall over safety concerns - http://www.bbc.co.uk
[16:59:28] <Bender> [HackerNews] - HotDrink: Constraint-Based UI Programming in JavaScript - http://hotdrink.github.io
[16:59:32] <Bender> [HackerNews] - MIT dean to start new university: “No majors, no lectures, no classrooms” - http://tech.mit.edu
[16:59:49] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[17:00:04] <Bender> [PhysOrg] - Germs, humans and numbers: New estimate revises our microbiome numbers downwards - http://phys.org
[17:00:08] <Bender> [PhysOrg] - Improved harvest for small farms thanks to naturally cloned crops - http://phys.org
[17:00:08] <Bender> [ScienceDaily] - Monarchs' wings yield clues to their birthplaces - http://www.sciencedaily.com
[17:00:10] <Bender> [SecurityWeek] - The Social Media Train Has Left the Station - Jump on with Open Eyes - http://feedproxy.google.com
[17:00:12] <Bender> [PhysOrg] - Scientists discover protein's starring role in genome stability, and possibly cancer prevention - http://phys.org
[17:00:16] <Bender> [TheRegister] - Puppet master investors tug on Citrix as 'wind turns' - http://go.theregister.com
[17:04:52] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[17:05:08] <Bender> [PhysOrg] - Researchers shed new light on regulation of repetitive DNA sequences - http://phys.org
[17:05:12] <Bender> [PhysOrg] - Octopuses shed their asocial reputation - http://phys.org
[17:05:12] <Bender> [ScienceDaily] - Seagrass genome sequence lends insights to salt tolerance - http://www.sciencedaily.com
[17:05:16] <Bender> [PhysOrg] - Insect growth regulator wears a second hat: Infection fighter - http://phys.org
[17:05:16] <Bender> [ScienceDaily] - Head shape, genetics augment understanding of rattlesnake species - http://www.sciencedaily.com
[17:05:20] <Bender> [PhysOrg] - Study reveals workings of mysterious 'relief valve' that protects cells from swelling - http://phys.org
[17:05:20] <Bender> [ScienceDaily] - Slender mice, heart disease and diabetes: What do they have in common? - http://www.sciencedaily.com
[17:05:24] <Bender> [PhysOrg] - To burn sugar or not to burn sugar: How eggs store fuel for embryo development - http://phys.org
[17:09:28] <Bender> [CNET] - Apple iPad Air 3 may spring up in March - CNET - http://feedproxy.google.com
[17:09:34] <Bender> [ForbesTech] - 2016 Cadillac CT6: Attention German Luxury Sedan Buyers -- Expand Your Horizons - http://www.forbes.com
[17:09:38] <Bender> [ForbesTech] - Six Tips From A Digital Deep Dive Into Wine - http://www.forbes.com
[17:09:57] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[17:10:01] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[17:10:05] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[17:10:09] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[17:10:13] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[17:10:16] <Bender> [ScienceDaily] - Ongoing HIV replication replenishes viral reservoirs during therapy - http://www.sciencedaily.com
[17:10:17] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[17:10:20] <Bender> [ScienceDaily] - Basic research led to first FDA-approved immunotherapy for pediatric cancer - http://www.sciencedaily.com
[17:10:21] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[17:10:24] <Bender> [ScienceDaily] - New material with built-in vitamin A may reduce scarring - http://www.sciencedaily.com
[17:10:25] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[17:10:29] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[17:10:33] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[17:10:37] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[17:10:41] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[17:10:45] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[17:10:49] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[17:10:53] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[17:10:57] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[17:11:01] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[17:11:05] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[17:11:09] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[17:11:13] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[17:11:17] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[17:11:21] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[17:11:25] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[17:11:29] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[17:11:33] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[17:11:37] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[17:11:41] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[17:11:45] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[17:11:49] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[17:11:53] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[17:11:57] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[17:12:01] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[17:12:05] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[17:12:09] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[17:12:13] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[17:12:17] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[17:12:21] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[17:12:25] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[17:12:29] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[17:12:33] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[17:12:37] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[17:12:41] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[17:12:45] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[17:12:49] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[17:12:53] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[17:12:57] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[17:13:01] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[17:13:05] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[17:13:09] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[17:13:13] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[17:13:17] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[17:13:21] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[17:13:25] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[17:13:29] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[17:13:33] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[17:13:37] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[17:13:41] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[17:13:46] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[17:13:50] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[17:13:54] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[17:13:58] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[17:14:02] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[17:14:06] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[17:14:10] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[17:14:14] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[17:14:18] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[17:14:22] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[17:14:24] <Bender> [ArsTechnica] - Dell XPS 15 review: A bigger version of the best PC laptop - http://arstechnica.com
[17:14:26] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[17:14:30] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[17:14:34] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[17:14:38] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[17:14:40] <Bender> [HackerNews] - The problem in American education isn't dumb teachers, but dumb teacher training - http://www.nytimes.com
[17:14:42] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[17:14:46] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[17:14:50] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[17:14:54] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[17:14:58] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[17:15:00] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[17:15:02] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[17:15:05] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[17:15:06] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[17:15:09] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[17:15:10] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[17:15:13] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[17:15:14] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[17:15:17] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[17:15:18] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[17:15:21] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[17:15:22] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[17:15:25] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[17:15:26] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[17:15:29] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[17:15:30] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[17:15:33] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[17:15:34] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[17:15:37] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[17:15:38] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[17:15:41] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[17:15:42] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[17:15:45] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[17:15:46] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[17:15:49] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[17:15:50] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[17:15:53] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[17:15:54] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[17:15:57] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[17:15:58] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[17:16:01] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[17:16:02] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[17:16:05] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[17:16:06] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[17:16:09] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[17:16:10] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[17:16:13] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[17:16:14] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[17:16:17] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[17:16:18] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[17:16:21] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[17:16:22] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[17:16:25] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[17:16:26] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[17:16:29] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[17:16:30] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[17:16:33] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[17:16:34] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[17:16:37] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[17:16:38] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[17:16:41] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[17:16:42] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[17:16:45] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[17:16:46] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[17:16:49] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[17:16:50] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[17:16:53] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[17:16:54] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[17:16:57] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[17:16:58] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[17:17:01] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[17:17:02] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[17:17:05] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[17:17:06] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[17:17:09] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[17:17:10] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[17:17:13] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[17:17:14] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[17:17:17] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[17:17:18] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[17:17:21] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[17:17:22] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[17:17:25] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[17:17:26] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[17:17:29] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[17:17:30] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[17:17:33] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[17:17:34] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[17:17:37] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[17:17:38] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[17:17:41] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[17:17:42] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[17:17:45] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[17:17:46] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[17:17:49] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[17:17:50] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[17:17:53] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[17:17:54] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[17:17:57] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[17:17:58] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[17:18:01] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[17:18:02] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[17:18:05] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[17:18:06] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[17:18:09] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[17:18:10] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[17:18:13] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[17:18:14] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[17:18:17] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[17:18:18] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[17:18:21] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[17:18:22] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[17:18:25] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[17:18:27] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[17:18:29] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[17:18:31] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[17:18:33] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[17:18:35] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[17:18:37] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[17:18:39] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[17:18:41] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[17:18:43] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[17:18:45] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[17:18:47] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[17:18:49] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[17:18:51] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[17:18:53] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[17:18:55] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[17:18:57] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[17:18:59] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[17:19:01] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[17:19:03] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[17:19:05] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[17:19:07] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[17:19:09] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[17:19:11] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[17:19:13] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[17:19:15] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[17:19:18] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[17:19:19] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[17:19:22] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[17:19:23] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[17:19:26] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[17:19:27] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[17:19:28] <Bender> [ArsTechnica] - A new open source cloud management tool… from Walmart - http://arstechnica.com
[17:19:30] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[17:19:31] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[17:19:34] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[17:19:35] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[17:19:38] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[17:19:39] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[17:19:42] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[17:19:43] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[17:19:46] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[17:19:47] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[17:19:51] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[17:19:55] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[17:19:59] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[17:20:03] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[17:20:04] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[17:20:07] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[17:20:08] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[17:20:11] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[17:20:12] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[17:20:15] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[17:20:16] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[17:20:19] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[17:20:20] <Bender> [PhysOrg] - Researchers develop a novel and efficient fabrication technology for cross-shaped memristor - http://phys.org
[17:20:20] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[17:20:23] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[17:20:24] <Bender> [ScienceDaily] - 'Lifespan machine' probes cause of aging - http://www.sciencedaily.com
[17:20:24] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[17:20:27] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[17:20:28] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[17:20:31] <Bender> [TheRegister] - Reg readers speak out on Thin Client technology - http://go.theregister.com
[17:20:31] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[17:20:32] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[17:20:35] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[17:20:36] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[17:20:39] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[17:20:41] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[17:20:43] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[17:20:45] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[17:20:47] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[17:20:49] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[17:20:51] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[17:20:53] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[17:20:55] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[17:20:57] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[17:20:59] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[17:21:01] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[17:21:03] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[17:21:05] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[17:21:07] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[17:21:09] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[17:21:11] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[17:21:13] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[17:21:15] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[17:21:17] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[17:21:19] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[17:21:21] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[17:21:23] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[17:21:25] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[17:21:27] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[17:21:29] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[17:21:31] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[17:21:33] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[17:21:35] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[17:21:37] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[17:21:39] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[17:21:41] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[17:21:43] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[17:21:45] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[17:21:47] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[17:21:51] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[17:21:55] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[17:21:59] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[17:22:03] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[17:22:07] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[17:22:11] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[17:22:15] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[17:22:19] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[17:22:23] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[17:22:27] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[17:22:31] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[17:22:35] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[17:22:39] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[17:22:43] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[17:22:47] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[17:22:51] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[17:22:55] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[17:22:59] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[17:23:03] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[17:23:07] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[17:23:12] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[17:23:16] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[17:23:20] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[17:23:24] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[17:23:28] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[17:23:32] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[17:23:36] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[17:23:40] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[17:23:44] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[17:23:48] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[17:23:52] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[17:23:56] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[17:24:00] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[17:24:04] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[17:24:08] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[17:24:12] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[17:24:16] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[17:24:20] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[17:24:24] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[17:24:28] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[17:24:32] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[17:24:33] <Bender> [BBCTech] - VIDEO: Drone register gives 'accountability' - http://www.bbc.co.uk
[17:24:36] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[17:24:38] <Bender> [BBCTech] - VIDEO: 'Megacopter' drone breaks world record - http://www.bbc.co.uk
[17:24:40] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[17:24:42] <Bender> [ComputerWorld] - The Android malware monster will never die - http://rss.computerworld.com
[17:24:44] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[17:24:48] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[17:24:48] <Bender> [HackerNews] - TBOX: The Multi-Platform C Library - http://sylnt.us
[17:24:52] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[17:24:52] <Bender> [HackerNews] - SpaceX successfully tests parachute for bringing astronauts back to earth - https://www.washingtonpost.com
[17:24:56] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[17:24:56] <Bender> [HackerNews] - [LEAK] Fraternal Order of Police Data Dump - https://fop.thecthulhu.com
[17:25:00] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[17:25:04] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[17:25:08] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[17:25:08] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[17:25:12] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[17:25:12] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[17:25:16] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[17:25:16] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[17:25:20] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[17:25:24] <Bender> [PhysOrg] - Dutch test first self-drive minibuses - http://phys.org
[17:25:24] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[17:25:28] <Bender> [ScienceDaily] - Antidepressants during pregnancy do not pose risk to unborn child, say researchers - http://www.sciencedaily.com
[17:25:28] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[17:25:32] <Bender> [ScienceDaily] - Simplifying solar cells with a new mix of materials - http://www.sciencedaily.com
[17:25:32] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[17:25:36] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[17:25:40] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[17:25:44] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[17:25:48] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[17:25:52] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[17:25:56] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[17:26:00] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[17:26:04] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[17:26:08] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[17:26:12] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[17:26:16] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[17:26:20] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[17:26:24] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[17:29:35] <Bender> [ArsTechnica] - Tired of just selling games, GameStop is now publishing them directly - http://arstechnica.com
[17:30:12] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[17:30:28] <Bender> [PhysOrg] - The importance of mixed motifs - http://phys.org
[17:30:31] <Bender> [ScienceDaily] - New research into the origins of the Austronesian languages - http://www.sciencedaily.com
[17:30:32] <Bender> [PhysOrg] - New research into the origins of the Austronesian languages - http://phys.org
[17:30:36] <Bender> [PhysOrg] - Intact nature offers best defense against climate change - http://phys.org
[17:30:40] <Bender> [PhysOrg] - Landscape pattern analysis reveals global loss of interior forest - http://phys.org
[17:33:44] <Bytram> looks like there is a pause, here.
[17:34:53] <Bender> [ForbesTech] - GameStop Is Now Officially In The Game Publishing Business With 'Song of the Deep' - http://www.forbes.com
[17:40:20] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[17:45:01] <Bender> [ForbesTech] - Can General Motors Become A Car-Sharing Maven? - http://www.forbes.com
[17:45:03] <Bender> [HackerNews] - Improved commenting with Markdown - http://sylnt.us
[17:45:07] <Bender> [HackerNews] - Some Performance Experiments for Simple Data Structures (2011) [pdf] - http://lsub.org
[17:45:51] <Bender> [SoylentNews] - FCC Says It Will “Unlock The Set-top Box” - http://sylnt.us
[17:47:01] <Bender> [Threatpost] - Oracle to Kill Java Browser Plugin - http://threatpost.com
[17:50:05] <Bender> [ForbesTech] - TeradataVoice: Data Visualization: Pretty Pictures Ain't Analytics - http://www.forbes.com
[17:50:09] <Bender> [ForbesTech] - TeradataVoice: How To Get The Most Impact From Your Investment In Marketing And Sales Content - http://www.forbes.com
[17:50:15] <Bender> [MITTech] - A Gadget for Spotting Fake Viagra, and Other Counterfeit Pills - http://www.technologyreview.com
[17:50:27] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[17:50:31] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[17:50:35] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[17:50:39] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[17:50:43] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[17:50:48] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[17:50:52] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[17:50:56] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[17:51:00] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[17:51:04] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[17:51:08] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[17:51:12] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[17:51:16] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[17:51:20] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[17:51:24] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[17:51:28] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[17:51:32] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[17:51:36] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[17:51:40] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[17:51:44] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[17:51:48] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[17:51:52] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[17:51:56] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[17:52:00] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[17:52:04] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[17:52:08] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[17:52:12] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[17:52:16] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[17:52:20] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[17:52:24] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[17:52:28] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[17:52:32] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[17:52:36] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[17:52:40] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[17:52:44] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[17:52:48] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[17:52:52] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[17:52:56] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[17:53:00] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[17:53:04] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[17:53:08] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[17:53:12] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[17:53:16] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[17:53:20] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[17:53:24] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[17:53:28] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[17:53:32] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[17:53:36] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[17:53:40] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[17:53:44] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[17:53:48] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[17:53:52] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[17:53:56] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[17:54:00] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[17:54:04] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[17:54:08] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[17:54:12] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[17:54:16] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[17:54:20] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[17:54:24] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[17:54:28] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[17:54:32] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[17:54:36] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[17:54:40] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[17:54:44] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[17:54:48] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[17:54:52] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[17:54:56] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[17:55:00] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[17:55:04] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[17:55:05] <Bender> [ComputerWorld] - Get ready for top-end smartphones with Qualcomm's Snapdragon 820 chip - http://rss.computerworld.com
[17:55:08] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[17:55:11] <Bender> [ForbesTech] - From Hoodies to Heuristics: Tech's Rebels Are Hiring Economists - http://www.forbes.com
[17:55:12] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[17:55:13] <Bender> [ITWorld] - Naysayers forced to eat words as Google's AI masters ancient game of Go - http://www.itworld.com
[17:55:16] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[17:55:21] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[17:55:25] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[17:55:29] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[17:55:33] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[17:55:37] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[17:55:41] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[17:55:45] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[17:55:47] <Bender> [PhysOrg] - Satellites show Florida beaches becoming darker, and that's good for sea turtles - http://phys.org
[17:55:49] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[17:55:51] <Bender> [ScienceDaily] - Antarctic fungi survive Martian conditions on the International Space Station - http://www.sciencedaily.com
[17:55:51] <Bender> [PhysOrg] - How bats recognize their own 'bat signals' - http://phys.org
[17:55:53] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[17:55:55] <Bender> [ScienceDaily] - Victimized adolescents more at risk of thinking about suicide or attempting suicide at 15 - http://www.sciencedaily.com
[17:55:57] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[17:56:01] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[17:56:05] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[17:56:09] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[17:56:13] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[17:56:17] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[17:56:21] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[17:56:25] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[17:56:29] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[17:56:33] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[17:56:37] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[17:56:41] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[17:56:45] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[17:56:49] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[17:56:53] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[17:56:57] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[17:57:01] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[17:57:05] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[17:57:09] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[17:57:13] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[17:57:17] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[17:57:21] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[17:57:25] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[17:57:29] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[17:57:33] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[17:57:37] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[17:57:41] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[17:57:45] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[17:57:49] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[17:57:53] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[17:57:57] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[17:58:01] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[17:58:05] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[17:58:09] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[17:58:13] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[17:58:17] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[17:58:21] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[17:58:25] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[17:58:29] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[17:58:33] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[17:58:37] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[17:58:41] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[17:58:45] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[17:58:49] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[17:58:53] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[17:58:57] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[17:59:01] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[17:59:05] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[17:59:09] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[17:59:13] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[17:59:17] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[17:59:21] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[17:59:25] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[17:59:29] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[17:59:34] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[17:59:38] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[17:59:42] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[17:59:46] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[17:59:50] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[17:59:54] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[17:59:58] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[18:00:02] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[18:00:06] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[18:00:10] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[18:00:14] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[18:00:18] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[18:00:22] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[18:00:26] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[18:00:30] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[18:00:34] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[18:00:35] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[18:00:38] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[18:00:39] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[18:00:42] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[18:00:43] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[18:00:46] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[18:00:47] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[18:00:50] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[18:00:51] <Bender> [PhysOrg] - Researchers document the work of leafcutter ants - http://phys.org
[18:00:51] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[18:00:54] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[18:00:55] <Bender> [ScienceDaily] - Breakthrough enables ultra fast transport of electrical charges in polymers - http://www.sciencedaily.com
[18:00:55] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[18:00:58] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[18:01:00] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[18:01:02] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[18:01:04] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[18:01:06] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[18:01:08] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[18:01:10] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[18:01:12] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[18:01:14] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[18:01:16] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[18:01:18] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[18:01:20] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[18:01:22] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[18:01:24] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[18:01:26] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[18:01:28] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[18:01:30] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[18:01:32] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[18:01:34] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[18:01:36] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[18:01:38] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[18:01:40] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[18:01:42] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[18:01:44] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[18:01:46] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[18:01:48] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[18:01:50] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[18:01:52] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[18:01:54] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[18:01:56] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[18:01:58] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[18:02:00] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[18:02:02] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[18:02:04] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[18:02:06] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[18:02:08] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[18:02:10] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[18:02:12] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[18:02:14] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[18:02:16] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[18:02:18] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[18:02:20] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[18:02:22] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[18:02:24] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[18:02:26] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[18:02:28] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[18:02:30] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[18:02:32] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[18:02:34] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[18:02:36] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[18:02:38] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[18:02:40] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[18:02:42] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[18:02:44] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[18:02:46] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[18:02:48] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[18:02:50] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[18:02:52] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[18:02:54] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[18:02:56] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[18:02:58] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[18:03:00] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[18:03:02] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[18:03:04] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[18:03:06] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[18:03:08] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[18:03:10] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[18:03:12] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[18:03:14] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[18:03:16] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[18:03:18] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[18:03:20] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[18:03:22] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[18:03:24] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[18:03:26] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[18:03:28] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[18:03:30] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[18:03:32] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[18:03:34] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[18:03:36] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[18:03:38] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[18:03:40] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[18:03:42] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[18:03:44] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[18:03:46] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[18:03:48] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[18:03:50] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[18:03:52] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[18:03:54] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[18:03:56] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[18:03:58] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[18:04:00] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[18:04:02] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[18:04:04] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[18:04:07] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[18:04:08] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[18:04:11] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[18:04:12] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[18:04:15] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[18:04:16] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[18:04:19] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[18:04:20] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[18:04:23] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[18:04:24] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[18:04:27] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[18:04:28] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[18:04:31] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[18:04:32] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[18:04:35] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[18:04:36] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[18:04:39] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[18:04:40] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[18:04:43] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[18:04:44] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[18:04:47] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[18:04:48] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[18:04:51] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[18:04:52] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[18:04:55] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[18:04:56] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[18:04:59] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[18:05:00] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[18:05:02] <Bender> [ArsTechnica] - Black hole physics with an added quantum of uncertainty - http://arstechnica.com
[18:05:03] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[18:05:04] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[18:05:07] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[18:05:09] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[18:05:10] <Bender> [CNET] - Apple recalls plug adapters over electric shock risk - CNET - http://feedproxy.google.com
[18:05:11] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[18:05:13] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[18:05:14] <Bender> [CNET] - Curvy Barbie? Famously skinny doll gets three new body types - CNET - http://feedproxy.google.com
[18:05:15] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[18:05:16] <Bender> [ForbesTech] - The Biggest U.S. IPOs In History - http://www.forbes.com
[18:05:17] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[18:05:18] <Bender> [CNET] - Automatic-braking study proves it's massively beneficial - Roadshow - http://feedproxy.google.com
[18:05:19] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[18:05:21] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[18:05:22] <Bender> [CNET] - T-Mobile adds Amazon Prime Video, Univision Now to Binge On - CNET - http://feedproxy.google.com
[18:05:23] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[18:05:26] <Bender> [CNET] - Daimler goes on the offensive, ensures its diesels are fully compliant - Roadshow - http://feedproxy.google.com
[18:05:27] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[18:05:31] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[18:05:35] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[18:05:39] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[18:05:39] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[18:05:43] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[18:05:43] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[18:05:47] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[18:05:47] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[18:05:51] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[18:05:51] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[18:05:54] <Bender> [PhysOrg] - Team uses internet network theory to decipher the first epigenetic communication network - http://phys.org
[18:05:55] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[18:05:55] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[18:05:58] <Bender> [PhysOrg] - Microtubules, assemble: New research may lead to better understanding of self-organization in cells - http://phys.org
[18:05:59] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[18:05:59] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[18:06:03] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[18:06:07] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[18:06:07] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[18:06:11] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[18:06:15] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[18:06:15] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[18:06:19] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[18:06:19] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[18:06:23] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[18:06:27] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[18:06:27] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[18:06:31] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[18:06:35] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[18:06:35] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[18:06:39] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[18:06:39] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[18:06:43] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[18:06:43] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[18:06:47] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[18:06:51] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[18:06:51] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[18:06:55] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[18:06:55] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[18:06:59] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[18:07:03] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[18:07:07] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[18:07:11] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[18:07:15] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[18:07:19] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[18:09:55] <Bytram> looks like there is a pause, here, too.
[18:10:43] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[18:10:47] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[18:10:51] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[18:10:58] <Bender> [PhysOrg] - Apple recalls power adapters sold outside United States - http://phys.org
[18:11:09] <Bender> [TheRegister] - Backblaze big data restore. Get this: it involves disk drives - http://go.theregister.com
[18:15:10] <Bender> [ArsTechnica] - Social carnivores aren’t smarter—it’s all in the relative brain size - http://arstechnica.com
[18:15:46] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[18:16:02] <Bender> [PhysOrg] - You'll never be-leaf what makes up this battery - http://phys.org
[18:16:14] <Bender> [SoylentNews] - FCC Says It Will “Unlock the Set-Top Box” - http://sylnt.us
[18:20:28] <Bender> [ForbesTech] - How Kenya's M-Kopa Brings Prepaid Solar Power To Rural Africa - http://www.forbes.com
[18:20:30] <Bender> [HackerNews] - Oil jumps as Russia says Saudis proposing global oil cut - http://www.reuters.com
[18:20:50] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[18:25:34] <Bender> [HackerNews] - Snapdocs is looking for an experienced and empathetic rails engineer - https://news.ycombinator.com
[18:25:36] <Bender> [ITWorld] - Increasingly popular update technique for iOS apps puts users at risk - http://www.itworld.com
[18:26:10] <Bender> [PhysOrg] - NASA Sees developing depression threatening northwestern Australia - http://phys.org
[18:31:14] <Bender> [PhysOrg] - Study offers new insights into Group A Streptococcus - http://phys.org
[18:31:20] <Bender> [SecurityWeek] - Cisco Patches Critical Flaw in Firewall Devices - http://feedproxy.google.com
[18:40:45] <Bender> [HackerNews] - SpaceX successfully tests parachute for bringing astronauts back [video] - https://www.washingtonpost.com
[18:40:49] <Bender> [HackerNews] - Fraternal Order of Police Data Dump - https://fop.thecthulhu.com
[18:41:25] <Bender> [ScienceDaily] - Want to rewire a neuron? You’ve got to take it slow - http://www.sciencedaily.com
[18:41:29] <Bender> [ScienceDaily] - Cell division: Microtubules, assemble! - http://www.sciencedaily.com
[18:45:49] <Bender> [HackerNews] - Activist Predicts His Own Death, Says the Cops Killed Him - http://fresnopeoplesmedia.com
[18:45:53] <Bender> [HackerNews] - Russia says Saudis proposing global oil production cut - http://www.reuters.com
[18:50:37] <Bender> [ArsTechnica] - High-severity bug in OpenSSL allows attackers to decrypt HTTPS traffic - http://arstechnica.com
[18:50:51] <Bender> [ForbesTech] - (Almost) Everything You Need To Know About Getting A Foreign Visa - http://www.forbes.com
[18:50:53] <Bender> [HackerNews] - Preact, a fast 3k React alternative - http://developit.github.io
[18:50:57] <Bender> [HackerNews] - TBOX: A Multi-Platform C Library - http://sylnt.us
[18:55:51] <Bender> [ComputerWorld] - Interest in smartphones is flattening - http://rss.computerworld.com
[18:55:55] <Bender> [ForbesTech] - 'The Division' Beta Starts Today On Xbox One, Tommorow On PC And PS4 - http://www.forbes.com
[18:55:57] <Bender> [HackerNews] - The result would be a catastrophe (1985) - http://www.lettersofnote.com
[19:01:01] <Bender> [HackerNews] - Show HN: “Nim in Action” is now available - http://nim-lang.org
[19:01:37] <Bender> [PhysOrg] - Chemists uncover how key agent allows diseases to reproduce - http://phys.org
[19:01:41] <Bender> [PhysOrg] - How 'more food per field' could help save our wild spaces - http://phys.org
[19:01:45] <Bender> [PhysOrg] - Heavy fermions get nuclear boost on way to superconductivity - http://phys.org
[19:01:48] <Bender> [TheRegister] - Apple yanks travel plugs over shock worries - http://go.theregister.com
[19:01:49] <Bender> [PhysOrg] - Completely new kind of polymer developed - http://phys.org
[19:01:53] <Bender> [PhysOrg] - Male mice without any Y chromosome genes can father offspring after assisted reproduction - http://phys.org
[19:05:57] <Bender> [CNET] - Stunning images show Martian labyrinth in vivid detail - CNET - http://feedproxy.google.com
[19:06:01] <Bender> [CNET] - How Apple's retail chief views her store workers - CNET - http://feedproxy.google.com
[19:06:03] <Bender> [ForbesTech] - Facebook Posts Solid Q4 Results On Rising Ad Pricing and Mobile Usage - http://www.forbes.com
[19:06:05] <Bender> [HackerNews] - OpenSSL Security Advisory - https://mta.openssl.org
[19:06:09] <Bender> [HackerNews] - Annoyances of API Design - http://chickenwing.software
[19:06:52] <Bender> [TheRegister] - We Googled the ex-Google guy and Google said he was clean, says Wikimedia - http://go.theregister.com
[19:11:02] <Bender> [ComputerWorld] - Popular iOS app update technique puts users at risk - http://rss.computerworld.com
[19:11:07] <Bender> [ForbesTech] - The Future Of Astronomy: NASA's James Webb Space Telescope - http://www.forbes.com
[19:11:08] <Bender> [HackerNews] - OpenSSL Key Recovery Attack on DH small subgroups (CVE-2016-0701) - http://intothesymmetry.blogspot.com
[19:11:45] <Bender> [PhysOrg] - Putting silicon 'sawdust' in a graphene cage boosts battery performance - http://phys.org
[19:11:49] <Bender> [PhysOrg] - How to make slums more resilient to climate change - http://phys.org
[19:16:10] <Bender> [ForbesTech] - Nissan Leaf Gets More Range, But Overall Electric Car Prospects Looks Grim - http://www.forbes.com
[19:16:12] <Bender> [HackerNews] - Dell XPS 15 review: A bigger version of the best PC laptop - http://arstechnica.com
[19:16:14] <Bender> [ForbesTech] - New 'Dark Souls 3' Screenshots Reveal The Firelink Shrine, And Possibly A Furtive Pygmy - http://www.forbes.com
[19:16:16] <Bender> [HackerNews] - Snapdocs is looking for an experienced and empathetic Rails engineer - https://news.ycombinator.com
[19:16:19] <Bender> [ForbesTech] - What Can Produce 10% Downside For Sirius XM's Stock In The Next 1-2 Years? - http://www.forbes.com
[19:17:01] <Bender> [SoylentNews] - January 28 is Data Privacy Day. Do you know where your data is? - http://sylnt.us
[19:21:16] <Bender> [HackerNews] - Los Angeles County's use of predictive analytics on at-risk children - http://www.psmag.com
[19:21:56] <Bender> [ScienceDaily] - Sensing the future of molecule detection, bioproduction - http://www.sciencedaily.com
[19:22:00] <Bender> [ScienceDaily] - Landscape pattern analysis reveals global loss of interior forest - http://www.sciencedaily.com
[19:23:16] <Bender> [UCLAHealth] - Protein combination improves bone regeneration, UCLA study shows - http://newsroom.ucla.edu
[19:26:18] <Bender> [ForbesTech] - From Hoodies To Heuristics: Tech's Rebels Are Hiring Economists - http://www.forbes.com
[19:26:21] <Bender> [HackerNews] - Show HN: Visual Search using features extracted from Tensor Flow inception model - http://sylnt.us
[19:26:22] <Bender> [ForbesTech] - AI Guru Andrew Ng: Government Must Play Big Role In Rollout Of Self-Driving Cars - http://www.forbes.com
[19:27:00] <Bender> [ScienceDaily] - Breakthrough enables ultra-fast transport of electrical charges in polymers - http://www.sciencedaily.com
[19:27:04] <Bender> [ScienceDaily] - Harnessing the oxidizing power of air - http://www.sciencedaily.com
[19:27:07] <Bender> [TheRegister] - Apple yanks international travel plugs over shock worries - http://go.theregister.com
[19:27:08] <Bender> [ScienceDaily] - Vaccine study shapes plan to wipe out rabies in free-roaming dogs - http://www.sciencedaily.com
[19:27:12] <Bender> [ScienceDaily] - Too-few proteins prompt nanoparticles to clump - http://www.sciencedaily.com
[19:27:16] <Bender> [ScienceDaily] - In lung cancer, not all HER2 alterations are created equal - http://www.sciencedaily.com
[19:27:20] <Bender> [ScienceDaily] - Necroptosis: How crystals precipitate cell death - http://www.sciencedaily.com
[19:32:00] <Bender> [PhysOrg] - The Latest: Advocates for blind lobby for driverless cars - http://phys.org
[19:32:04] <Bender> [PhysOrg] - Facebook flips on switch for live video on its iPhone app - http://phys.org
[19:36:12] <Bender> [ArsTechnica] - VW starts recall in Europe, gets serious about “BUDD-e” electric concept van - http://arstechnica.com
[19:36:26] <Bender> [ForbesTech] - Of Course There's A Video Game Where You Can Kill Donald Trump - http://www.forbes.com
[19:37:04] <Bender> [PhysOrg] - New technology to virtually light up 3-point line on ABC - http://phys.org
[19:37:08] <Bender> [ScienceDaily] - Small is different - http://www.sciencedaily.com
[19:37:12] <Bender> [ScienceDaily] - Anticholinergics may not be best choice for rehab patients with dementia - http://www.sciencedaily.com
[19:37:16] <Bender> [ScienceDaily] - Satellites show Florida beaches becoming darker, and that's good for sea turtles - http://www.sciencedaily.com
[19:46:36] <Bender> [HackerNews] - Taplytics (YC W14) is hiring a UI/UX designer that likes to code - https://taplytics.com
[19:47:23] <Bender> [TheRegister] - Word up: BlackEnergy SCADA hackers change tactics - http://go.theregister.com
[19:51:48] <Bender> [MITTech] - The Drug That Killed Michael Jackson Is Helping Us Unravel the Mystery of Consciousness - http://www.technologyreview.com
[19:52:16] <Bender> [PhysOrg] - Computer expert gets no jail time in extensive spamming case - http://phys.org
[19:52:20] <Bender> [ScienceDaily] - Want to learn a new skill? Faster? Change up your practice sessions - http://www.sciencedaily.com
[19:56:38] <Bender> [ComputerWorld] - Apple steps back in time to patch OS X 10.6 Snow Leopard - http://rss.computerworld.com
[20:01:37] <Bender> [Bugtraq] - Bugtraq: [SECURITY] [DSA 3459-1] mysql-5.5 security update - http://www.securityfocus.com
[20:02:23] <Bender> [PhysOrg] - Giant gas cloud boomeranging back into Milky Way - http://phys.org
[20:02:29] <Bender> [SecurityWeek] - "Lockdroid" Ransomware Can Lock Smartphones, Erase Data - http://feedproxy.google.com
[20:06:43] <Bender> [CNET] - Rocket League adding free Deadmau5 DLC in February - CNET - http://feedproxy.google.com
[20:06:47] <Bender> [CNET] - Ratchet and Clank dev's new game is a little girl's submarine adventure - CNET - http://feedproxy.google.com
[20:06:49] <Bender> [ForbesTech] - AdTech-Inspired Advice For Real Timing Your Business - http://www.forbes.com
[20:06:51] <Bender> [CNET] - Here's when Elder Scrolls Online's Thieves Guild DLC will release - CNET - http://feedproxy.google.com
[20:06:55] <Bender> [CNET] - Hideo Kojima reflects on making 'magic' after World Tour Comes to an End - CNET - http://feedproxy.google.com
[20:06:59] <Bender> [CNET] - Street Fighter 5's Yoshinori Ono reflects on the past, worries about the future - CNET - http://feedproxy.google.com
[20:07:31] <Bender> [ScienceDaily] - Bringing time and space together for universal symmetry - http://www.sciencedaily.com
[20:07:35] <Bender> [ScienceDaily] - How queen bees control the princesses - http://www.sciencedaily.com
[20:07:38] <Bender> [TheRegister] - Senate marks Data Privacy Day with passage of critical bill for Safe Harbor - http://go.theregister.com
[20:07:39] <Bender> [ScienceDaily] - Octopuses shed their asocial reputation - http://www.sciencedaily.com
[20:07:43] <Bender> [ScienceDaily] - Enormous blades could lead to more offshore energy in US - http://www.sciencedaily.com
[20:12:43] <Bender> [TheScientist] - Surrogate Genes Enable Reproduction - http://www.the-scientist.com
[20:16:43] <Bender> [ArsTechnica] - HP teams up with designer Isaac Mizrahi to make a flashy women’s smartwatch - http://arstechnica.com
[20:16:59] <Bender> [HackerNews] - GroovyLab – Matlab like user friendly scientific programming using Groovy - http://sylnt.us
[20:22:01] <Bender> [ForbesTech] - IBM Buys Digital Agency Resource Ammirati To Boost Its Design Business - http://www.forbes.com
[20:22:03] <Bender> [HackerNews] - Pyjion – A JIT for Python Based Upon CoreCLR - http://sylnt.us
[20:26:51] <Bender> [ArsTechnica] - US Commerce Department wants courts to be kinder, gentler to file sharers - http://arstechnica.com
[20:27:05] <Bender> [ForbesTech] - IBM Buys Digital Agency Resource/Ammirati In Bid To Boost Its Design Business - http://www.forbes.com
[20:29:08] <Bender> [UCLASciTech] - Moon was produced by a head-on collision between Earth and a forming planet - http://newsroom.ucla.edu
[20:32:10] <Bender> [HackerNews] - Desk.com has been up and down almost two days - http://www.desk.com
[20:32:14] <Bender> [HackerNews] - $230 Sit/stand Desk: IKEA SKARSTA Review - http://blog.c-mart.in
[20:32:51] <Bender> [ScienceDaily] - The brain communicates on several channels - http://www.sciencedaily.com
[20:32:55] <Bender> [ScienceDaily] - How bats recognize their own 'bat signals' - http://www.sciencedaily.com
[20:32:59] <Bender> [ScienceDaily] - Fleeting fruit in a tropical forest - http://www.sciencedaily.com
[20:33:03] <Bender> [ScienceDaily] - Epigenetic switch for obesity - http://www.sciencedaily.com
[20:36:58] <Bender> [ArsTechnica] - Berkeley’s cell phone radiation warning law can go into effect, judge rules - http://arstechnica.com
[20:37:54] <Bender> [ScienceDaily] - Why you won't lose weight with exercise alone - http://www.sciencedaily.com
[20:37:58] <Bender> [ScienceDaily] - Research hints at a nutritional strategy for reducing autism risk - http://www.sciencedaily.com
[20:38:02] <Bender> [ScienceDaily] - New way to identify brain tumor aggressiveness - http://www.sciencedaily.com
[20:38:06] <Bender> [ScienceDaily] - Identifying another piece in the Parkinson's disease pathology puzzle - http://www.sciencedaily.com
[20:42:16] <Bender> [ForbesTech] - CenturyLinkVoice: 5 Software-As-A-Service Apps Shaking Up Small Business - http://www.forbes.com
[20:42:52] <Bender> [Nature] - Brazil's surge in small-headed babies questioned by report - http://feeds.nature.com
[20:47:22] <Bender> [HackerNews] - GDC 2016: Khronos Sessions - https://www.khronos.org
[20:47:26] <Bender> [HackerNews] - Washington Gives $1.3M in Parking Fines During Snowstorm - http://www.nytimes.com
[20:48:11] <Bender> [SoylentNews] - How to Hide from the Internet’s Surveillance Machine - http://sylnt.us
[20:52:10] <Bender> [ArsTechnica] - Tesla could possibly announce two vehicles in March, a sedan and a crossover - http://arstechnica.com
[20:52:24] <Bender> [ForbesTech] - What's Up And Wrong With Apple Inc's Stock? - http://www.forbes.com
[20:52:26] <Bender> [HackerNews] - A $640 Uber ride is one expensive financial lesson - https://www.washingtonpost.com
[20:52:30] <Bender> [HackerNews] - IKEA Skarsta Review: Sit/Stand desk - http://blog.c-mart.in
[20:54:29] <Bender> [WiredScience] - Print an Army of Giant, Articulated Fish From This 3-D Database - http://feeds.wired.com
[20:57:24] <Bender> [ComputerWorld] - Verizon to let SMBs buy smartphones on the installment plan - http://rss.computerworld.com
[20:57:28] <Bender> [ForbesTech] - Why Bridge Of Spies Is Both Thrilling And Truthful And What It's Like To Work With Steven Spielberg - http://www.forbes.com
[20:57:30] <Bender> [HackerNews] - Apache Traffic Server - https://trafficserver.apache.org
[20:57:34] <Bender> [HackerNews] - How China accumulated $28T in debt - http://www.businessinsider.com
[20:57:38] <Bender> [HackerNews] - Sit/Stand Desk: IKEA Skarsta Review - http://blog.c-mart.in
[20:59:22] <Bender> [ScienceMag] - [Working Life] Battling the bureaucracy hydra - http://science.sciencemag.org
[20:59:26] <Bender> [ScienceMag] - [New Products] New Products - http://science.sciencemag.org
[20:59:30] <Bender> [ScienceMag] - [Report] Two genes substitute for the mouse Y chromosome for spermatogenesis and reproduction - http://science.sciencemag.org
[20:59:34] <Bender> [ScienceMag] - [Report] Most microbe-specific naïve CD4+ T cells produce memory cells during infection - http://science.sciencemag.org
[20:59:38] <Bender> [ScienceMag] - [Report] An unprecedented mechanism of nucleotide methylation in organisms containing thyX - http://science.sciencemag.org
[20:59:42] <Bender> [ScienceMag] - [Report] Airway acidification initiates host defense abnormalities in cystic fibrosis mice - http://science.sciencemag.org
[20:59:46] <Bender> [ScienceMag] - [Report] Simultaneous covalent and noncovalent hybrid polymerizations - http://science.sciencemag.org
[20:59:50] <Bender> [ScienceMag] - [Report] Oxygen isotopic evidence for vigorous mixing during the Moon-forming giant impact - http://science.sciencemag.org
[20:59:54] <Bender> [ScienceMag] - [Report] Periodic slow slip triggers megathrust zone earthquakes in northeastern Japan - http://science.sciencemag.org
[20:59:58] <Bender> [ScienceMag] - [Report] Emergence of superconductivity in the canonical heavy-electron metal YbRh2Si2 - http://science.sciencemag.org
[21:00:02] <Bender> [ScienceMag] - [Report] Ancient Babylonian astronomers calculated Jupiter’s position from the area under a time-velocity graph - http://science.sciencemag.org
[21:00:06] <Bender> [ScienceMag] - [Report] Enhanced East Pacific Rise hydrothermal activity during the last two glacial terminations - http://science.sciencemag.org
[21:00:10] <Bender> [ScienceMag] - [Report] Activation of Cu(111) surface by decomposition into nanoclusters driven by CO adsorption - http://science.sciencemag.org
[21:00:14] <Bender> [ScienceMag] - [Research Article] The 3.8 Å structure of the U4/U6.U5 tri-snRNP: Insights into spliceosome assembly and catalysis - http://science.sciencemag.org
[21:00:18] <Bender> [ScienceMag] - [Research Article] A zebrafish melanoma model reveals emergence of neural crest identity during melanoma initiation - http://science.sciencemag.org
[21:00:22] <Bender> [ScienceMag] - [Research Article] Translation from the 5′ untranslated region shapes the integrated stress response - http://science.sciencemag.org
[21:00:26] <Bender> [ScienceMag] - [Editors' Choice] Engineering a bacterial “Deadman” walking - http://science.sciencemag.org
[21:00:30] <Bender> [ScienceMag] - [Editors' Choice] Dendritic cells have two ways to tango - http://science.sciencemag.org
[21:00:34] <Bender> [ScienceMag] - [Editors' Choice] Our varied methylome - http://science.sciencemag.org
[21:00:38] <Bender> [ScienceMag] - [Editors' Choice] Bandages to aid diabetic wound healing - http://science.sciencemag.org
[21:00:42] <Bender> [ScienceMag] - [Editors' Choice] A double-drug approach for chronic pain - http://science.sciencemag.org
[21:00:46] <Bender> [ScienceMag] - [Editors' Choice] Flipping for higher exam scores - http://science.sciencemag.org
[21:00:50] <Bender> [ScienceMag] - [Editors' Choice] Saving water—but at what cost? - http://science.sciencemag.org
[21:00:54] <Bender> [ScienceMag] - [This Week in Science] Environmental changes bridge evolutionary valleys - http://science.sciencemag.org
[21:00:58] <Bender> [ScienceMag] - [This Week in Science] Genetics of bird mating systems - http://science.sciencemag.org
[21:01:02] <Bender> [ScienceMag] - [This Week in Science] Patterns of biodiversity change - http://science.sciencemag.org
[21:01:06] <Bender> [ScienceMag] - [This Week in Science] A special way to make T - http://science.sciencemag.org
[21:01:10] <Bender> [ScienceMag] - [This Week in Science] Searching sediment for climate signals - http://science.sciencemag.org
[21:01:14] <Bender> [ScienceMag] - [This Week in Science] Nanoclusters just by adding CO - http://science.sciencemag.org
[21:01:18] <Bender> [ScienceMag] - [This Week in Science] Structure of a key spliceosomal complex - http://science.sciencemag.org
[21:01:22] <Bender> [ScienceMag] - [This Week in Science] How cells keep going in the face of adversity - http://science.sciencemag.org
[21:01:26] <Bender> [ScienceMag] - [This Week in Science] Doubling down on polymerization - http://science.sciencemag.org
[21:01:30] <Bender> [ScienceMag] - [This Week in Science] Visualizing the beginnings of melanoma - http://science.sciencemag.org
[21:01:34] <Bender> [ScienceMag] - [This Week in Science] A MEK threshold in the placenta - http://science.sciencemag.org
[21:01:38] <Bender> [ScienceMag] - [This Week in Science] Antisense now makes sense - http://science.sciencemag.org
[21:01:42] <Bender> [ScienceMag] - [This Week in Science] Rehomogenizing the Earth-Moon system - http://science.sciencemag.org
[21:01:46] <Bender> [ScienceMag] - [This Week in Science] Replacing the Y chromosome - http://science.sciencemag.org
[21:01:50] <Bender> [ScienceMag] - [This Week in Science] All T cells can remember - http://science.sciencemag.org
[21:01:54] <Bender> [ScienceMag] - [This Week in Science] Airway infections put to an acid test - http://science.sciencemag.org
[21:01:58] <Bender> [ScienceMag] - [This Week in Science] Going to extremes to find superconductivity - http://science.sciencemag.org
[21:02:02] <Bender> [ScienceMag] - [This Week in Science] Babylonian astronomers tracked Jupiter - http://science.sciencemag.org
[21:02:06] <Bender> [ScienceMag] - [This Week in Science] A silent and periodic earthquake trigger - http://science.sciencemag.org
[21:02:10] <Bender> [ScienceMag] - [Association Affairs] Results of the 2015 election of AAAS officers - http://science.sciencemag.org
[21:02:14] <Bender> [ScienceMag] - [Association Affairs] Call for nomination of 2016 fellows - http://science.sciencemag.org
[21:02:18] <Bender> [ScienceMag] - [Association Affairs] U.S. and Cuban researchers begin neuroscience collaborations - http://science.sciencemag.org
[21:02:22] <Bender> [ScienceMag] - [Letter] Tenure's tenure - http://science.sciencemag.org
[21:02:26] <Bender> [ScienceMag] - [Technical Response] Response to Comment on “Worldwide evidence of a unimodal relationship between productivity and plant species richness” - http://science.sciencemag.org
[21:02:30] <Bender> [ScienceMag] - [Technical Comment] Comment on “Worldwide evidence of a unimodal relationship between productivity and plant species richness” - http://science.sciencemag.org
[21:02:32] <Bender> [ForbesTech] - Aukey Lens Offers Wide Angle Shooting For Your iPhone - http://www.forbes.com
[21:02:34] <Bender> [ScienceMag] - [Letter] Tropical dams: To build or not to build? - http://science.sciencemag.org
[21:02:38] <Bender> [ScienceMag] - [Letter] A necrogenomic registry's potential - http://science.sciencemag.org
[21:02:42] <Bender> [ScienceMag] - [Perspective] Tracking the origins of tumorigenesis - http://science.sciencemag.org
[21:02:46] <Bender> [ScienceMag] - [Perspective] Prescription drugs obscure microbiome analyses - http://science.sciencemag.org
[21:02:50] <Bender> [ScienceMag] - [Policy Forum] How can higher-yield farming help to spare nature? - http://science.sciencemag.org
[21:02:54] <Bender> [ScienceMag] - [Perspective] How ecosystems change - http://science.sciencemag.org
[21:02:58] <Bender> [ScienceMag] - [Perspective] Avian supergenes - http://science.sciencemag.org
[21:03:02] <Bender> [ScienceMag] - [Book Review] Life on the edge - http://science.sciencemag.org
[21:03:06] <Bender> [ScienceMag] - [Feature] A cancer legacy - http://science.sciencemag.org
[21:03:10] <Bender> [ScienceMag] - [Feature] Tibet's primeval ice - http://science.sciencemag.org
[21:03:14] <Bender> [ScienceMag] - [In Depth] Ancient Babylonians took first steps to calculus - http://science.sciencemag.org
[21:03:19] <Bender> [ScienceMag] - [In Depth] Researchers claim to find HIV sanctuaries - http://science.sciencemag.org
[21:03:23] <Bender> [ScienceMag] - [In Depth] A fish back from the dead - http://science.sciencemag.org
[21:03:27] <Bender> [ScienceMag] - [In Depth] Rare isotopes offer clues to the chemistry of the planet - http://science.sciencemag.org
[21:03:31] <Bender> [ScienceMag] - [In Depth] Can Germany engineer a coal exit? - http://science.sciencemag.org
[21:03:35] <Bender> [ScienceMag] - [In Brief] News at a glance - http://science.sciencemag.org
[21:03:39] <Bender> [ScienceMag] - [Editorial] Global science engagement - http://science.sciencemag.org
[21:03:43] <Bender> [ScienceMag] - [Multimedia] Cover stories: Making the Babylonian tablet cover - http://science.sciencemag.org
[21:03:47] <Bender> [ScienceMag] - [Errata] Erratum for the Research Article “Gating of hippocampal activity, plasticity, and memory by entorhinal cortex long-range inhibition” by J. Basu, J. D. Zaremba, S. K. Cheung, F. L. Hitti, B. V. Zemelman, A. Losonczy, S. A. Siegelbaum - http://science.sciencemag.org
[21:04:31] <Bender> [Threatpost] - OpenSSL Patches Serious Flaws in Library - http://threatpost.com
[21:07:35] <Bender> [ForbesTech] - What's Wrong With Apple's Stock? - http://www.forbes.com
[21:07:37] <Bender> [HackerNews] - Show HN: Building a market for Penetration Testing - https://www.stealthworker.com
[21:07:39] <Bender> [ForbesTech] - Why 'Bridge Of Spies' Is Both Thrilling And Truthful And What It's Like To Work With Steven Spielberg - http://www.forbes.com
[21:07:44] <Bender> [ForbesTech] - What Is The Current State Of Bitcoin And Blockchain Technology? - http://www.forbes.com
[21:07:48] <Bender> [ForbesTech] - Apple's iPhone 7 Plus Secret Camera Project Revealed - http://www.forbes.com
[21:08:24] <Bender> [TheRegister] - Alleged ISIL hacker faces US terror charges for doxxing soldiers - http://go.theregister.com
[21:12:35] <Bender> [ComputerWorld] - Facebook masters mobile, carrying company to record earnings - http://rss.computerworld.com
[21:12:41] <Bender> [HackerNews] - Announcing TypeScript 1.8 Beta - http://blogs.msdn.com
[21:12:45] <Bender> [HackerNews] - Show HN: Building a Market for Penetration Testing - https://www.stealthworker.com
[21:17:43] <Bender> [ForbesTech] - Amazon Shares Plunge After Earnings Miss Wide Of Mark - http://www.forbes.com
[21:23:29] <Bender> [ScienceDaily] - Completely new kind of polymer could lead to artificial muscles, self-repairing materials - http://www.sciencedaily.com
[21:28:40] <Bender> [TheRegister] - 30 years on from Challenger, NASA remembers the fallen - http://go.theregister.com
[21:37:45] <Bender> [ArsTechnica] - Tom Wheeler fires back at cable lobby, says cable box fees are too high - http://arstechnica.com
[21:47:52] <Bender> [ArsTechnica] - Elon Musk to unveil Mars plans this year, wants to go to space by 2020 - http://arstechnica.com
[21:53:04] <Bender> [CNET] - Toyota uses 7 sumo wrestlers to explain its safety systems - Roadshow - http://feedproxy.google.com
[21:53:08] <Bender> [CNET] - Watch Paul Rudd beat Stephen Hawking at quantum chess - CNET - http://feedproxy.google.com
[21:53:12] <Bender> [HackerNews] - Show HN: Statusbot – API for monitoring all status pages - https://statusbot.io
[21:53:12] <Bender> [CNET] - Why it's a big deal that Google beat a human at Go (CNET Update show notes) - CNET - http://feedproxy.google.com
[21:53:16] <Bender> [CNET] - This lonely planet is in the longest-distance relationship ever - CNET - http://feedproxy.google.com
[21:58:14] <Bender> [ForbesTech] - 'The Wolfpack' Documentary Director: 'Brands Have Become The Savior Of Art' - http://www.forbes.com
[21:58:16] <Bender> [HackerNews] - Staffjoy Adds Time and Attendance Tracking - https://blog.staffjoy.com
[22:03:18] <Bender> [ForbesTech] - Microsoft Shares Jump On Good News That Cloud Is Still Growing - http://www.forbes.com
[22:03:54] <Bender> [Nature] - Babylonian astronomers used geometry to track Jupiter - http://feeds.nature.com
[22:08:24] <Bender> [HackerNews] - Facebook is closing Parse - http://blog.parse.com
[22:08:26] <Bender> [ITWorld] - Amazon's cloud is flying high, but profit disappoints overall - http://www.itworld.com
[22:13:21] <Bender> [ComputerWorld] - Laid-off IT workers muzzled as H-1B debate heats up - http://rss.computerworld.com
[22:13:25] <Bender> [ForbesTech] - BOXX Unleashes Powerful, Liquid-Cooled Workstations With Up To Five Dual-Slot GPUs And 36 CPU Cores - http://www.forbes.com
[22:13:25] <Bender> [ComputerWorld] - Amazon's cloud is flying high, but profit disappoints overall - http://rss.computerworld.com
[22:13:27] <Bender> [HackerNews] - Facebook to Shut Down Parse, Its Platform for Mobile Developers - http://bits.blogs.nytimes.com
[22:13:29] <Bender> [ForbesTech] - Jeff Bezos Loses $6 Billion As Amazon Shares Drop After Hours - http://www.forbes.com
[22:18:32] <Bender> [HackerNews] - Parse-Server: Parse-Compatible API Server Module for Node/Express - http://sylnt.us
[22:18:44] <Bender> [NISTBio] - NCCoE Seeks Vendors to Help Secure Wireless Medical Devices - http://www.nist.gov
[22:18:52] <Bender> [NISTIT] - NCCoE Seeks Vendors to Help Secure Wireless Medical Devices - http://www.nist.gov
[22:23:19] <Bender> [ArsTechnica] - Xerox to split into 2 companies - http://arstechnica.com
[22:23:35] <Bender> [HackerNews] - Microsoft Cloud Strength Highlights Second Quarter Results - https://www.microsoft.com
[22:29:19] <Bender> [ScienceDaily] - Bedbugs develop resistance to widely used chemical treatments, rendering them ineffective - http://www.sciencedaily.com
[22:29:26] <Bender> [TheRegister] - Microsoft on Cloud 9 after online biz boosts profits to $6.3bn in second quarter - http://go.theregister.com
[22:29:30] <Bender> [TheRegister] - Open source plugin aims to defeat link rot - http://go.theregister.com
[22:33:35] <Bender> [CNET] - Your impulse buys are costing Amazon a fortune - CNET - http://feedproxy.google.com
[22:33:41] <Bender> [ForbesTech] - Microsoft Shares Jump On Strong Results, Growth In Cloud Business - http://www.forbes.com
[22:33:45] <Bender> [ForbesTech] - Jeff Bezos Loses More Than $6 Billion As Amazon Shares Drop After Hours - http://www.forbes.com
[22:38:49] <Bender> [ITWorld] - Microsoft's revenue falls, but cloud remains a bright spot - http://www.itworld.com
[22:39:21] <Bender> [Nature] - In Japan, small shakes presage big quakes - http://feeds.nature.com
[22:43:35] <Bender> [ArsTechnica] - Tesla says it won’t announce two vehicles in March [Updated] - http://arstechnica.com
[22:43:49] <Bender> [ForbesTech] - What Do Americans Think Of Their Privacy? - http://www.forbes.com
[22:43:51] <Bender> [HackerNews] - George W. Bush is smarter than you - http://keithhennessey.com
[22:48:54] <Bender> [HackerNews] - How to Discover a Galaxy with a Telephoto Lens - http://nautil.us
[22:49:02] <Bender> [MITTech] - California Decides the Future for Solar Is Net Metering - http://www.technologyreview.com
[22:49:06] <Bender> [MITTech] - Recommended from Around the Web (Week ending January 30, 2016) - http://www.technologyreview.com
[22:49:43] <Bender> [SoylentNews] - Facebook Hits 1.59 Billion Users, Posts Record Q4 2015 Profits - http://sylnt.us
[22:53:58] <Bender> [HackerNews] - Facebook Shutting Down Parse - http://techcrunch.com
[23:04:06] <Bender> [HackerNews] - Building a Serverless Slack Slash Command - https://tonicdev.com
[23:04:13] <Bender> [Krebs] - FTC: Tax Fraud Behind 47% Spike in ID Theft - http://krebsonsecurity.com
[23:09:02] <Bender> [CNET] - Stanford to Colbert: Yes, you can climb like Spider-Man - CNET - http://feedproxy.google.com
[23:09:08] <Bender> [ForbesTech] - Xbox Live Reaches Record With 48 Million Active Subscribers - http://www.forbes.com
[23:09:10] <Bender> [HackerNews] - Smarking is hiring Sr.Engineer to build data infrastructure for parking industry - https://jobs.lever.co
[23:09:12] <Bender> [ForbesTech] - We Don't Need Fully Autonomous Cars To Prevent Crashes - http://www.forbes.com
[23:13:58] <Bender> [ArsTechnica] - Cloud, Surface are the highlights of Microsoft’s $23.8 billion quarter - http://arstechnica.com
[23:14:54] <Bender> [ScienceDaily] - Heavy fermions get nuclear boost on way to superconductivity - http://www.sciencedaily.com
[23:14:58] <Bender> [ScienceDaily] - Putting silicon 'sawdust' in a graphene cage boosts battery performance - http://www.sciencedaily.com
[23:15:02] <Bender> [ScienceDaily] - Monstrous cloud boomerangs back to our galaxy - http://www.sciencedaily.com
[23:19:58] <Bender> [ScienceDaily] - How severe maternal inflammation can lead to autism-like behavior - http://www.sciencedaily.com
[23:29:25] <Bender> [HackerNews] - Overstock.com Accepts $20M to Settle Market Manipulation Case - http://www.globenewswire.com
[23:35:18] <Bender> [TheRegister] - US still lagging on broadband but FCC promises change is coming - http://go.theregister.com
[23:44:23] <Bender> [BBCTech] - Microsoft boosted by cloud services - http://www.bbc.co.uk
[23:44:27] <Bender> [BBCTech] - Amazon shares slide on sales miss - http://www.bbc.co.uk
[23:50:17] <Bender> [PhysOrg] - Moon was produced by a head-on collision between Earth and a forming planet - http://phys.org
[23:54:45] <Bender> [HackerNews] - VMware's Stumbling Cloud Adventure - http://chrisdodds.net
[23:54:47] <Bender> [ITWorld] - Facebook is shuttering the Parse developer platform - http://www.itworld.com
[23:55:21] <Bender> [PhysOrg] - Team develops award-winning interactive agent system - http://phys.org