#rss-bot | Logs for 2016-01-28

« return
[00:00:01] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[00:00:05] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[00:00:09] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[00:00:13] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[00:00:17] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[00:00:21] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[00:00:25] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[00:00:29] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[00:00:33] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[00:00:37] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[00:00:41] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[00:00:45] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[00:00:49] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[00:00:53] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[00:00:57] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[00:01:01] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[00:01:05] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[00:01:09] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[00:01:13] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[00:01:17] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[00:01:21] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[00:01:25] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[00:01:29] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[00:01:33] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[00:01:37] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[00:01:41] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[00:01:45] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[00:01:49] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[00:01:53] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[00:01:53] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:01:57] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[00:01:57] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[00:02:01] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[00:02:01] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[00:02:05] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[00:02:05] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[00:02:09] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[00:02:09] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[00:02:13] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[00:02:14] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[00:02:17] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[00:02:18] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[00:02:19] <Bender> [TheRegister] - Aereo TV boss is back ... pitching gigabit internet and a $350 Wi-Fi router - http://go.theregister.com
[00:02:21] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[00:02:21] <Bender> [SoylentNews] - Baidu Entering The Driverless Car Race - http://sylnt.us
[00:02:22] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[00:02:25] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[00:02:26] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[00:02:29] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[00:02:30] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[00:02:33] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[00:02:34] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[00:02:37] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[00:02:38] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[00:02:41] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[00:02:42] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[00:02:45] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[00:02:46] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[00:02:49] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[00:02:50] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[00:02:53] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[00:02:54] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[00:02:57] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[00:02:58] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[00:03:01] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[00:03:02] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[00:03:05] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[00:03:06] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:03:09] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[00:03:10] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[00:03:13] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[00:03:14] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[00:03:17] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[00:03:18] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[00:03:21] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[00:03:22] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[00:03:25] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[00:03:26] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[00:03:29] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[00:03:30] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[00:03:33] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[00:03:34] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[00:03:37] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[00:03:38] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[00:03:41] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[00:03:42] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:03:45] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[00:03:46] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[00:03:49] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[00:03:50] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[00:03:53] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[00:03:54] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[00:03:57] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[00:03:58] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[00:04:01] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[00:04:02] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[00:04:05] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[00:04:06] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[00:04:09] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[00:04:10] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[00:04:13] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[00:04:14] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[00:04:17] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[00:04:18] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[00:04:21] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[00:04:22] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[00:04:25] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[00:04:26] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[00:04:29] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[00:04:30] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[00:04:33] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[00:04:34] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[00:04:37] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[00:04:38] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[00:04:41] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[00:04:42] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[00:04:45] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[00:04:46] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[00:04:49] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[00:04:50] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[00:04:53] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[00:04:54] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[00:04:57] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[00:04:58] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[00:05:01] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[00:05:02] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[00:05:05] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[00:05:06] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[00:05:09] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[00:05:10] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[00:05:13] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[00:05:14] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[00:05:17] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[00:05:18] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[00:05:21] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[00:05:22] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[00:05:25] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[00:05:26] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[00:05:29] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[00:05:30] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[00:05:33] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[00:05:34] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[00:05:37] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[00:05:38] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[00:05:41] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[00:05:42] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[00:05:45] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[00:05:46] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[00:05:49] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[00:05:50] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[00:05:53] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[00:05:54] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[00:05:57] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[00:05:58] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[00:06:01] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[00:06:02] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[00:06:05] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[00:06:06] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[00:06:09] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[00:06:10] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[00:06:13] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[00:06:14] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[00:06:17] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[00:06:18] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[00:06:21] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[00:06:22] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[00:06:25] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[00:06:26] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[00:06:30] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[00:06:30] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[00:06:34] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[00:06:35] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[00:06:36] <Bender> [HackerNews] - Jade template language forced to rename to Pug - http://sylnt.us
[00:06:38] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[00:06:39] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[00:06:43] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[00:06:47] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[00:06:51] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[00:06:55] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[00:06:57] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[00:06:59] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[00:07:01] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[00:07:03] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[00:07:05] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[00:07:07] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[00:07:09] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[00:07:11] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[00:07:13] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[00:07:15] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[00:07:17] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[00:07:19] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[00:07:21] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[00:07:23] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[00:07:25] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[00:07:27] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[00:07:29] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[00:07:31] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[00:07:33] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[00:07:35] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[00:07:37] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[00:07:39] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[00:07:41] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[00:07:43] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[00:07:45] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[00:07:47] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[00:07:49] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[00:07:51] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[00:07:53] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[00:07:55] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[00:07:57] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[00:07:59] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[00:08:01] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[00:08:03] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[00:08:05] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[00:08:07] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[00:08:09] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[00:08:11] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[00:08:13] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[00:08:15] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[00:08:17] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[00:08:19] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[00:08:21] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[00:08:25] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[00:08:29] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[00:08:33] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[00:08:37] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[00:17:04] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[00:17:31] <Bender> [TheRegister] - Map of Tasmania to be shorn of electrical, data links to outside world - http://go.theregister.com
[00:21:47] <Bender> [HackerNews] - Facebook profit tops $1B; Revenue up 52% from Q4 2014 - http://www.wsj.com
[00:22:08] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[00:22:12] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[00:22:35] <Bender> [TheRegister] - This EMC is bereft of expansion, it is formerly increasing ... it is ex-growth - http://go.theregister.com
[00:27:12] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[00:31:55] <Bender> [HackerNews] - Paul Krugman Reviews ‘The Rise and Fall of American Growth’ by Robert J. Gordon - http://www.nytimes.com
[00:31:59] <Bender> [HackerNews] - GitHub is down - http://sylnt.us
[00:32:04] <Bender> [HackerNews] - GitHub Outage - http://sylnt.us
[00:32:16] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[00:36:59] <Bender> [HackerNews] - Ray Tracing in One Weekend - http://in1weekend.blogspot.com
[00:37:03] <Bender> [HackerNews] - GitHub Down? - http://sylnt.us
[00:42:03] <Bender> [HackerNews] - Aereo Founder Is Back with New High-Speed Wireless Service - http://www.wsj.com
[00:46:59] <Bender> [CNET] - Watch a guy invite deadly snakes to bite him -- to prove a point - CNET - http://feedproxy.google.com
[00:47:03] <Bender> [CNET] - Here's a hoverboard that 'probably' won't explode - CNET - http://feedproxy.google.com
[00:47:28] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[00:47:32] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[00:47:36] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[00:47:40] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[00:47:44] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[00:47:48] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[00:47:52] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[00:47:56] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[00:48:00] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[00:48:04] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[00:48:08] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[00:48:12] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[00:48:16] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[00:48:20] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[00:48:24] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[00:48:28] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[00:48:32] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[00:48:36] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[00:48:40] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[00:48:44] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[00:48:48] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[00:48:52] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[00:48:56] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[00:49:00] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[00:49:04] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[00:49:08] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[00:49:12] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[00:49:16] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[00:49:20] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[00:49:24] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[00:49:28] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[00:49:32] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[00:49:36] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[00:49:40] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[00:49:44] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[00:49:48] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[00:49:52] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[00:49:56] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[00:50:00] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[00:50:04] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[00:50:08] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[00:50:12] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[00:50:16] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[00:50:20] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[00:50:24] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[00:50:28] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[00:50:32] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[00:50:36] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[00:50:40] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[00:50:44] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[00:50:48] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[00:50:52] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[00:50:56] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[00:51:00] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[00:51:04] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[00:51:08] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[00:51:12] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[00:51:16] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[00:51:20] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[00:51:24] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[00:51:28] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[00:51:32] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[00:51:36] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[00:51:41] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[00:51:45] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[00:51:49] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[00:51:53] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[00:51:57] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[00:52:01] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[00:52:05] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[00:52:09] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[00:52:11] <Bender> [HackerNews] - SmartAsset is hiring a data engineer to build custom analytics/reporting tools - https://careers.jobscore.com
[00:52:13] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[00:52:15] <Bender> [HackerNews] - Spiders that have formed armies 50,000 strong - http://www.bbc.com
[00:52:17] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[00:52:21] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[00:52:25] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[00:52:29] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[00:52:31] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[00:52:33] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[00:52:35] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[00:52:37] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[00:52:39] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[00:52:41] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[00:52:43] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[00:52:45] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[00:52:48] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[00:52:49] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[00:52:52] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[00:52:53] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[00:52:56] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[00:52:57] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[00:53:00] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[00:53:01] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[00:53:04] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[00:53:05] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[00:53:08] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[00:53:09] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[00:53:12] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[00:53:13] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[00:53:16] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[00:53:17] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[00:53:20] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[00:53:21] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[00:53:24] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[00:53:25] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[00:53:28] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[00:53:29] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[00:53:32] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[00:53:33] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[00:53:36] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[00:53:37] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[00:53:40] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[00:53:41] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[00:53:44] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[00:53:45] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[00:53:48] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[00:53:49] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[00:53:52] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[00:53:53] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[00:53:56] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[00:53:57] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[00:54:00] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[00:54:01] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[00:54:04] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[00:54:05] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[00:54:08] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[00:54:09] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[00:54:12] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[00:54:13] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[00:54:16] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[00:54:17] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[00:54:20] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[00:54:21] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[00:54:24] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[00:54:25] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[00:54:28] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[00:54:29] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[00:54:32] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[00:54:33] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[00:54:36] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[00:54:37] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[00:54:40] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[00:54:41] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[00:54:44] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[00:54:45] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[00:54:48] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[00:54:49] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[00:54:52] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[00:54:53] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[00:54:56] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[00:54:57] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[00:55:00] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[00:55:01] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[00:55:04] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[00:55:05] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[00:55:08] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[00:55:09] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[00:55:12] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[00:55:13] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[00:55:16] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[00:55:17] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[00:55:20] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[00:55:21] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[00:55:24] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[00:55:25] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[00:55:28] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[00:55:29] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[00:55:32] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[00:55:33] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[00:55:36] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[00:55:37] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[00:55:40] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[00:55:41] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[00:55:44] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[00:55:45] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[00:55:48] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[00:55:49] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[00:55:52] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[00:55:53] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[00:55:56] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[00:55:58] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[00:56:00] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[00:56:02] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[00:56:04] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[00:56:06] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[00:56:08] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[00:56:10] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[00:56:12] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[00:56:14] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[00:56:16] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[00:56:18] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[00:56:20] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[00:56:22] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[00:56:24] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[00:56:26] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[00:56:28] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[00:56:30] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[00:56:32] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[00:56:34] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[00:56:36] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[00:56:38] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[00:56:40] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[00:56:42] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[00:56:44] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[00:56:46] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[00:56:49] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[00:56:50] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[00:56:53] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[00:56:54] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[00:56:57] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[00:56:58] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[00:57:01] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[00:57:01] <Bender> [BBCTech] - Samsung hit by slowing smartphone sales - http://www.bbc.co.uk
[00:57:02] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[00:57:05] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[00:57:06] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[00:57:09] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[00:57:10] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[00:57:13] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[00:57:13] <Bender> [ForbesTech] - Oculus Rift Can't Compete With PlayStation VR or HTC Vive, But Their Marketing Might... - http://www.forbes.com
[00:57:14] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[00:57:15] <Bender> [HackerNews] - The wisdom teeth industry is probably a scam - http://fusion.net
[00:57:17] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[00:57:18] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[00:57:22] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[00:57:26] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[00:57:30] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:57:34] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[00:57:36] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[00:57:38] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[00:57:40] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[00:57:42] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[00:57:44] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[00:57:46] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[00:57:48] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[00:57:50] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[00:57:52] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[00:57:54] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[00:57:56] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[00:57:58] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[00:58:00] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[00:58:02] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[00:58:04] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[00:58:06] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[00:58:08] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[00:58:10] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[00:58:12] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[00:58:14] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[00:58:16] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[00:58:18] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[00:58:20] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[00:58:22] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[00:58:24] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[00:58:26] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[00:58:28] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[00:58:30] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[00:58:32] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[00:58:34] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[00:58:36] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[00:58:38] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[00:58:40] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[00:58:42] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:58:44] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[00:58:46] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[00:58:48] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[00:58:50] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[00:58:52] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[00:58:54] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[00:58:56] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[00:58:58] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[00:59:00] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[00:59:02] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[00:59:04] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[00:59:06] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[00:59:08] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[00:59:10] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[00:59:12] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[00:59:14] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[00:59:16] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[00:59:18] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[00:59:22] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[00:59:26] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[00:59:30] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[00:59:34] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[00:59:38] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[00:59:42] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[00:59:46] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[00:59:50] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[00:59:54] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[00:59:58] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[01:00:02] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[01:00:06] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[01:00:10] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[01:00:14] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[01:00:18] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[01:00:22] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[01:00:27] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[01:00:31] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[01:00:35] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[01:00:39] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[01:00:43] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[01:00:47] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[01:00:51] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[01:00:55] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[01:00:59] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[01:01:03] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[01:01:07] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[01:01:11] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[01:01:15] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[01:01:19] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[01:01:23] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[01:01:27] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[01:01:31] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[01:01:35] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[01:01:39] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:01:43] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[01:01:47] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[01:01:51] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[01:01:55] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[01:01:59] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[01:02:02] <Bender> [ArsTechnica] - HTC Vive Pre impressions: A great VR system has only gotten better - http://arstechnica.com
[01:02:03] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[01:02:07] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[01:02:11] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[01:02:15] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[01:02:18] <Bender> [HackerNews] - Does America need to change how it elects its presidents? - http://www.bbc.co.uk
[01:02:19] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[01:02:22] <Bender> [HackerNews] - GitHub Experiencing Significant Network Disruption - https://twitter.com
[01:02:23] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[01:02:27] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[01:02:31] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[01:02:35] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[01:02:39] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[01:02:39] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:02:43] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[01:02:47] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[01:02:51] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[01:02:55] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[01:02:59] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[01:03:03] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[01:03:06] <Bender> [TheRegister] - GitHub falls offline, devs worldwide declare today a snow day - http://go.theregister.com
[01:03:08] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[01:03:12] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[01:03:16] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[01:03:20] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[01:03:24] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[01:03:28] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[01:03:32] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[01:03:36] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[01:03:40] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[01:03:44] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[01:03:48] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[01:03:52] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[01:03:56] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[01:07:14] <Bender> [CNET] - I watched live from my first grade class as Challenger exploded - CNET - http://feedproxy.google.com
[01:07:22] <Bender> [HackerNews] - Show HN: WinMerge for synching SQL Servers to version-controlled scripts - http://servantt.com
[01:07:26] <Bender> [HackerNews] - Visualizing Concurrency in Go - https://divan.github.io
[01:07:30] <Bender> [HackerNews] - Facebook Climbs to 1.59B Users, Beats Q4 Estimates with $5.8B Revenue - http://techcrunch.com
[01:12:26] <Bender> [HackerNews] - California Police Used Stingrays in Planes to Spy on Phones - http://www.wired.com
[01:12:47] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[01:12:51] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[01:17:30] <Bender> [HackerNews] - Sheryl Sandberg Is Wrong: Silicon Valley Wants MBAs - http://tapwage.com
[01:17:34] <Bender> [HackerNews] - The Startups Hiding in UBS, Citigroup and Barclays - http://www.bloomberg.com
[01:17:51] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[01:22:28] <Bender> [ComputerWorld] - As video surges, Facebook eyes a dedicated service - http://rss.computerworld.com
[01:22:34] <Bender> [HackerNews] - GitHub is down - http://sylnt.us
[01:22:54] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[01:27:30] <Bender> [CNET] - Samsung still smarting from phone slump - CNET - http://feedproxy.google.com
[01:27:34] <Bender> [CNET] - Swimming with drones > dancing with wolves (Tomorrow Daily 305 show notes) - CNET - http://feedproxy.google.com
[01:27:38] <Bender> [CNET] - I watched live from my first-grade class as Challenger exploded - CNET - http://feedproxy.google.com
[01:32:44] <Bender> [ITWorld] - Samsung profit plummets on weak smartphone sales - http://www.itworld.com
[01:33:30] <Bender> [SoylentNews] - Microsoft Releases CNTK, its Open Source Deep Learning Toolkit, on GitHub - http://sylnt.us
[01:37:39] <Bender> [ComputerWorld] - Samsung profit plummets on sagging smartphone sales - http://rss.computerworld.com
[01:37:45] <Bender> [HackerNews] - Frozen Poop Pills Fight Life-Threatening Infections - http://www.npr.org
[01:37:49] <Bender> [HackerNews] - Query Sniper - https://corner.squareup.com
[01:37:53] <Bender> [HackerNews] - How does Twitter feel about Bernie, Hillary, and trump? - http://candidatetwittertracker.com
[01:39:49] <Bender> [WiredScience] - Federal Regulators Say a Theranos Lab Has Serious Problems - http://feeds.wired.com
[01:42:48] <Bender> [ForbesTech] - The Best Upcoming Indie PC And Video Game Releases Of February (2016) - http://www.forbes.com
[01:42:52] <Bender> [ForbesTech] - EA Sacrifices E3 Expo Power To Focus On Gamers With Standalone Event - http://www.forbes.com
[01:43:11] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[01:43:15] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[01:43:19] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[01:43:23] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[01:43:27] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[01:43:31] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[01:43:35] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[01:43:39] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[01:43:43] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[01:43:47] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[01:43:51] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[01:43:55] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[01:43:59] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[01:44:03] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[01:44:07] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[01:44:11] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[01:44:15] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[01:44:19] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[01:44:23] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[01:44:27] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[01:44:31] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[01:44:35] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[01:44:39] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[01:44:43] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[01:44:47] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[01:44:51] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[01:44:55] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[01:44:59] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[01:45:03] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[01:45:07] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[01:45:11] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[01:45:15] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[01:45:19] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[01:45:23] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[01:45:27] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[01:45:31] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[01:45:35] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[01:45:39] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[01:45:43] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[01:45:47] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[01:45:51] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[01:45:55] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[01:45:59] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[01:46:03] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[01:46:07] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[01:46:11] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[01:46:15] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[01:46:19] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[01:46:24] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[01:46:28] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[01:46:32] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[01:46:36] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[01:46:40] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[01:46:44] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[01:46:48] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[01:46:52] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[01:46:56] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[01:47:00] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[01:47:04] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[01:47:08] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[01:47:12] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[01:47:16] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[01:47:20] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[01:47:24] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[01:47:28] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[01:47:32] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[01:47:36] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[01:47:37] <Bender> [ArsTechnica] - Oracle deprecates the Java browser plugin, prepares for its demise - http://arstechnica.com
[01:47:40] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[01:47:44] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[01:47:48] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[01:47:52] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[01:47:53] <Bender> [HackerNews] - DeLoreans Coming Back to Production - http://money.cnn.com
[01:47:56] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[01:48:00] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[01:48:04] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[01:48:08] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[01:48:12] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[01:48:14] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[01:48:16] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[01:48:18] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[01:48:20] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[01:48:22] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[01:48:24] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[01:48:26] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[01:48:28] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[01:48:30] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[01:48:32] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[01:48:34] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[01:48:36] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[01:48:38] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[01:48:40] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[01:48:40] <Bender> [TheRegister] - Oracle to kill off Java browser plugins with JDK 9 - http://go.theregister.com
[01:48:42] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[01:48:44] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[01:48:46] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[01:48:48] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[01:48:50] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[01:48:52] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[01:48:54] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[01:48:56] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[01:48:58] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[01:49:00] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[01:49:02] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[01:49:04] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[01:49:06] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[01:49:08] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[01:49:10] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[01:49:12] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[01:49:14] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[01:49:16] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[01:49:18] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[01:49:20] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[01:49:22] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[01:49:24] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[01:49:26] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[01:49:28] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[01:49:30] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[01:49:32] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[01:49:34] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[01:49:36] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[01:49:38] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[01:49:40] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[01:49:42] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[01:49:44] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[01:49:46] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[01:49:48] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[01:49:50] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[01:49:52] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[01:49:54] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[01:49:56] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[01:49:58] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[01:50:00] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[01:50:02] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[01:50:04] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[01:50:06] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[01:50:08] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[01:50:10] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[01:50:12] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[01:50:14] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[01:50:16] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[01:50:18] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[01:50:20] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[01:50:22] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[01:50:24] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[01:50:26] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[01:50:28] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[01:50:30] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[01:50:32] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[01:50:34] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[01:50:36] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[01:50:38] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[01:50:40] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[01:50:42] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[01:50:44] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[01:50:46] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[01:50:48] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[01:50:50] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[01:50:52] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[01:50:54] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[01:50:57] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[01:50:58] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[01:51:01] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[01:51:02] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[01:51:05] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[01:51:06] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[01:51:09] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[01:51:10] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[01:51:13] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[01:51:14] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[01:51:17] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[01:51:18] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[01:51:21] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[01:51:22] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[01:51:25] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[01:51:26] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[01:51:29] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[01:51:31] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[01:51:33] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[01:51:35] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[01:51:37] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[01:51:39] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[01:51:41] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[01:51:43] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[01:51:45] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[01:51:47] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[01:51:49] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[01:51:51] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[01:51:53] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[01:51:55] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[01:51:57] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[01:51:59] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[01:52:01] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[01:52:03] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[01:52:05] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[01:52:07] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[01:52:09] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[01:52:11] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[01:52:13] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[01:52:15] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[01:52:17] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[01:52:19] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[01:52:21] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[01:52:23] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[01:52:25] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[01:52:27] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[01:52:29] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[01:52:31] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[01:52:33] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[01:52:35] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[01:52:37] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[01:52:39] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[01:52:41] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[01:52:43] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[01:52:45] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[01:52:47] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[01:52:49] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[01:52:51] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[01:52:53] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[01:52:55] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[01:52:57] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[01:52:57] <Bender> [HackerNews] - Distro Astro – Linux Distribution for Astronomy - http://www.distroastro.org
[01:52:59] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[01:52:59] <Bender> [ITWorld] - Outlook for iOS gets a calendar widget as Sunrise's sunset looms - http://www.itworld.com
[01:53:01] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[01:53:05] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[01:53:09] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[01:53:13] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:53:17] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[01:53:21] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[01:53:25] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[01:53:29] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[01:53:33] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[01:53:37] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[01:53:41] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[01:53:45] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[01:53:49] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[01:53:53] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[01:53:57] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[01:54:01] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[01:54:05] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[01:54:09] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[01:54:13] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[01:54:17] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[01:54:21] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[01:54:25] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:54:29] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[01:54:33] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[01:54:37] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[01:54:41] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[01:54:45] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[01:54:49] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[01:54:53] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[01:54:57] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[01:55:01] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:55:05] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[01:55:09] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[01:55:13] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[01:55:17] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[01:55:21] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[01:55:26] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[01:55:30] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[01:55:34] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[01:55:38] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[01:55:42] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[01:55:46] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[01:55:50] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[01:55:54] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[01:55:58] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[01:56:02] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[01:56:06] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[01:56:10] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[01:56:14] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[01:56:18] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[01:56:22] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[01:56:26] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[01:56:30] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[01:56:34] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[01:56:38] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[01:56:42] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[01:56:46] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[01:56:50] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[01:56:54] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[01:56:58] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[01:57:02] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[01:57:06] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[01:57:10] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[01:57:14] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[01:57:18] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[01:57:22] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:57:26] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[01:57:30] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[01:57:34] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[01:57:38] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[01:57:42] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[01:57:46] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[01:57:50] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[01:57:54] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[01:57:58] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[01:58:01] <Bender> [HackerNews] - Not just Flint: Poor communities across the country live with extreme polluters - https://www.washingtonpost.com
[01:58:02] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[01:58:06] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[01:58:10] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[01:58:14] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[01:58:18] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[01:58:22] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[01:58:22] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:58:26] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[01:58:26] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[01:58:30] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[01:58:30] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[01:58:34] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[01:58:34] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[01:58:38] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[01:58:38] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[01:58:42] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[01:58:42] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[01:58:46] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[01:58:46] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[01:58:50] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[01:58:50] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[01:58:54] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[01:58:54] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[01:58:58] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[01:58:58] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[01:59:02] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[01:59:02] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[01:59:06] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[01:59:06] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[01:59:10] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[01:59:10] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[01:59:14] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[01:59:14] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[01:59:18] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[01:59:18] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[01:59:22] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[01:59:22] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[01:59:26] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[01:59:26] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[01:59:30] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[01:59:30] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[01:59:34] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[01:59:34] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[01:59:38] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[01:59:38] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[01:59:42] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[01:59:46] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[01:59:50] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[01:59:54] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[01:59:58] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[02:00:02] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[02:03:05] <Bender> [HackerNews] - YC-backed cannabis tech company hiring front end devs in Bay Area - https://angel.co
[02:03:25] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[02:03:29] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[02:03:33] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[02:03:52] <Bender> [TheRegister] - Windows Mobile users suffer backup super-slurp as Redmond forgets Wi-Fi switch - http://go.theregister.com
[02:08:08] <Bender> [HackerNews] - Go 1.6 Release Candidate 1 is released - https://groups.google.com!topic/golang-nuts/4iqU__h7skQ
[02:08:31] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[02:13:33] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[02:18:08] <Bender> [CNET] - Unions charge T-Mobile with shady business practices - CNET - http://feedproxy.google.com
[02:18:14] <Bender> [ForbesTech] - Mark Zuckerberg Becomes World's Sixth Richest Person As Facebook Shares Soar - http://www.forbes.com
[02:18:38] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[02:18:42] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[02:18:46] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[02:18:50] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[02:18:54] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[02:18:58] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[02:19:02] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[02:19:03] <Bender> [TheRegister] - Israeli academics claim they can predict botnet attacks - http://go.theregister.com
[02:19:06] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[02:19:10] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[02:19:14] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[02:19:18] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[02:19:22] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[02:19:26] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[02:19:30] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[02:19:34] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[02:19:38] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[02:19:42] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[02:19:46] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[02:19:50] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[02:19:54] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[02:19:58] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[02:20:02] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[02:20:06] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[02:20:10] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[02:20:14] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[02:20:18] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[02:20:22] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[02:20:26] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[02:20:30] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[02:20:34] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[02:20:38] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[02:20:42] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[02:20:46] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[02:20:50] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[02:20:54] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[02:20:58] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[02:21:02] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[02:21:06] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[02:21:10] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[02:21:14] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[02:21:18] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[02:21:22] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[02:21:27] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[02:21:31] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[02:21:35] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[02:21:39] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[02:21:43] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[02:21:47] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[02:21:51] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[02:21:55] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[02:21:59] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[02:22:03] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[02:22:07] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[02:22:11] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[02:22:15] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[02:22:19] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[02:22:23] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[02:22:27] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[02:22:31] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[02:22:35] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[02:22:39] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[02:22:43] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[02:22:47] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[02:22:51] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[02:22:55] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[02:22:59] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[02:23:03] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[02:23:07] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[02:23:11] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[02:23:15] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[02:23:19] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[02:23:20] <Bender> [HackerNews] - The Economist: Glamorous tech startups can be brutal places for workers - http://www.economist.com
[02:23:23] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[02:23:27] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[02:23:31] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[02:23:35] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[02:23:39] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[02:23:41] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[02:23:43] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[02:23:45] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[02:23:47] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[02:23:49] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[02:23:51] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[02:23:53] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[02:23:55] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[02:23:57] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[02:23:59] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[02:24:01] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[02:24:03] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[02:24:05] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[02:24:07] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[02:24:09] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[02:24:11] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[02:24:13] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[02:24:15] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[02:24:17] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[02:24:19] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[02:24:21] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[02:24:23] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[02:24:25] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[02:24:27] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[02:24:29] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[02:24:31] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[02:24:33] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[02:24:35] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[02:24:37] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[02:24:39] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[02:24:41] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[02:24:43] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[02:24:45] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[02:24:47] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[02:24:49] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[02:24:51] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[02:24:53] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[02:24:55] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[02:24:57] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[02:24:59] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[02:25:01] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[02:25:03] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[02:25:05] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[02:25:07] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[02:25:09] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[02:25:11] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[02:25:13] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[02:25:15] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[02:25:17] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[02:25:19] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[02:25:21] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[02:25:23] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[02:25:25] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[02:25:27] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[02:25:29] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[02:25:31] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[02:25:33] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[02:25:35] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[02:25:37] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[02:25:39] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[02:25:41] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[02:25:43] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[02:25:45] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[02:25:47] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[02:25:49] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[02:25:52] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[02:25:53] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[02:25:56] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[02:25:57] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[02:26:00] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[02:26:01] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[02:26:04] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[02:26:05] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[02:26:08] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[02:26:09] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[02:26:12] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[02:26:13] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[02:26:16] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[02:26:17] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[02:26:20] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[02:26:21] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[02:26:24] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[02:26:25] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[02:26:28] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[02:26:29] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[02:26:32] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[02:26:33] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[02:26:36] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[02:26:37] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[02:26:40] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[02:26:41] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[02:26:44] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[02:26:45] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[02:26:48] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[02:26:49] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[02:26:52] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[02:26:54] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[02:26:56] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[02:26:58] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[02:27:00] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[02:27:02] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[02:27:04] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[02:27:06] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[02:27:08] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[02:27:10] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[02:27:12] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[02:27:14] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[02:27:16] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[02:27:18] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[02:27:20] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[02:27:22] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[02:27:24] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[02:27:26] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[02:27:28] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[02:27:30] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[02:27:32] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[02:27:34] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[02:27:36] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[02:27:38] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[02:27:40] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[02:27:42] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[02:27:44] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[02:27:46] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[02:27:48] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[02:27:50] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[02:27:52] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[02:27:54] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[02:27:56] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[02:27:58] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[02:28:00] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[02:28:02] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[02:28:04] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[02:28:06] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[02:28:08] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[02:28:10] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[02:28:10] <Bender> [BBCTech] - Keeping football tough but safe - http://www.bbc.co.uk
[02:28:12] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[02:28:14] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[02:28:16] <Bender> [CNET] - Smartphone shipments said to have banner year in 2015 - CNET - http://feedproxy.google.com
[02:28:16] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[02:28:18] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[02:28:20] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[02:28:22] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[02:28:24] <Bender> [HackerNews] - Boxful - https://www.boxful.com
[02:28:24] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[02:28:26] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[02:28:28] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[02:28:32] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[02:28:36] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[02:28:40] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[02:28:44] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[02:28:45] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[02:28:49] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[02:28:49] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[02:28:53] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[02:28:53] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[02:28:57] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[02:28:57] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[02:29:01] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[02:29:01] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[02:29:05] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[02:29:05] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[02:29:09] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[02:29:09] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[02:29:13] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[02:29:13] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[02:29:17] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[02:29:17] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[02:29:21] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[02:29:21] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[02:29:25] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[02:29:25] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[02:29:29] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[02:29:29] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[02:29:33] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[02:29:33] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[02:29:37] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[02:29:37] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[02:29:41] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[02:29:41] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[02:29:45] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[02:29:45] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[02:29:49] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[02:29:49] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[02:29:53] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[02:29:53] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[02:29:57] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[02:29:57] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[02:30:01] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[02:30:01] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[02:30:05] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[02:30:05] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[02:30:09] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[02:30:09] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[02:30:13] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[02:30:13] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[02:30:17] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[02:30:17] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[02:30:21] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[02:30:21] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[02:30:25] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[02:30:25] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[02:30:29] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[02:30:33] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[02:30:37] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[02:30:41] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[02:30:45] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[02:30:49] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[02:30:53] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[02:30:57] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[02:31:01] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[02:31:05] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[02:31:09] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[02:31:13] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[02:31:17] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[02:31:21] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[02:31:25] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[02:31:29] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[02:31:33] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[02:31:37] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[02:31:41] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[02:31:45] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[02:31:49] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[02:31:53] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[02:31:57] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[02:32:01] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[02:32:05] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[02:32:09] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[02:32:13] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[02:32:17] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[02:32:21] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[02:32:25] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[02:32:29] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[02:32:33] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[02:32:37] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[02:32:41] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[02:32:45] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[02:32:49] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[02:32:53] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[02:32:57] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[02:33:01] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[02:33:06] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[02:33:10] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[02:33:14] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[02:33:18] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[02:33:22] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[02:33:26] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[02:33:28] <Bender> [HackerNews] - Hardware, Less Hard - http://www.themacro.com
[02:33:30] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[02:33:30] <Bender> [ITWorld] - Apple is in a position to overtake Samsung as world's top chip buyer - http://www.itworld.com
[02:33:34] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[02:33:38] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[02:33:42] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[02:33:46] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[02:33:50] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[02:33:54] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[02:33:58] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[02:34:02] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[02:34:06] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[02:34:10] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[02:34:14] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[02:34:18] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[02:34:22] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[02:34:26] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[02:34:30] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[02:34:34] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[02:34:38] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[02:34:42] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[02:34:46] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[02:34:50] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[02:34:54] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[02:34:58] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[02:35:02] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[02:35:06] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[02:38:32] <Bender> [HackerNews] - A Long Game - http://techcrunch.com
[02:38:52] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[02:38:56] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[02:39:00] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[02:39:19] <Bender> [TheRegister] - Sony slurps Altair Semiconductor to make 'things' sing - http://go.theregister.com
[02:43:34] <Bender> [ForbesTech] - Microsoft's Biggest Hits And Flops - http://www.forbes.com
[02:43:38] <Bender> [ITWorld] - Verizon is building for the Super Bowl and staying for the boom - http://www.itworld.com
[02:43:38] <Bender> [ForbesTech] - When 'Free' Windows 10 Becomes Expensive, You Should Fear This - http://www.forbes.com
[02:43:42] <Bender> [ForbesTech] - In Pictures: iPhone 6s vs Galaxy S6 - http://www.forbes.com
[02:43:46] <Bender> [ForbesTech] - Galaxy S7 Leak '100% Confirms' 5 Brilliant New Features - http://www.forbes.com
[02:43:55] Bytram|away is now known as Bytram
[02:44:03] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[02:48:31] <Bender> [CNET] - Watch a guy let deadly snakes bite him to prove a point - CNET - http://feedproxy.google.com
[02:48:39] <Bender> [HackerNews] - Chrome Cleanup Tool - https://www.google.com
[02:53:43] <Bender> [HackerNews] - YC-backed cannabis tech company hiring front-end devs in Bay Area - https://angel.co
[02:54:04] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[03:03:51] <Bender> [HackerNews] - Removing support for Emacs unexec from Glibc - http://lwn.net
[03:04:40] <Bender> [SoylentNews] - "My Little Pony" Sued for Using a Pirated Font - TorrentFreak - http://sylnt.us
[03:08:55] <Bender> [HackerNews] - How Following Others Will Leave You Broke - http://calmscience.net
[03:11:21] -!- richardboegliAFK [richardboegliAFK!~r@180-32-566-585.dyn.iinet.net.au] has joined #rss-bot
[03:14:20] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[03:14:24] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[03:14:28] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[03:14:32] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[03:14:36] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[03:14:40] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[03:14:44] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[03:14:48] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[03:14:52] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[03:14:56] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[03:14:57] -!- richardboegli has quit [Ping timeout: 268 seconds]
[03:15:00] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[03:15:04] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[03:15:08] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[03:15:12] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[03:15:16] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[03:15:20] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[03:15:24] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[03:15:28] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[03:15:32] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[03:15:36] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[03:15:40] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[03:15:44] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[03:15:48] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[03:15:52] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[03:15:56] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[03:16:00] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[03:16:04] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[03:16:08] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[03:16:12] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[03:16:16] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[03:16:20] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[03:16:24] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[03:16:28] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[03:16:32] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[03:16:36] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[03:16:40] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[03:16:44] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[03:16:48] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[03:16:52] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[03:16:56] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[03:17:00] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[03:17:04] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[03:17:08] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[03:17:12] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[03:17:16] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[03:17:20] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[03:17:24] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[03:17:28] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[03:17:32] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[03:17:36] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[03:17:40] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[03:17:44] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[03:17:48] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[03:17:52] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[03:17:56] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[03:18:00] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[03:18:04] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[03:18:08] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[03:18:12] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[03:18:16] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[03:18:20] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[03:18:24] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[03:18:29] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[03:18:33] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[03:18:37] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[03:18:41] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[03:18:45] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[03:18:49] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[03:18:53] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[03:18:57] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[03:19:01] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[03:19:01] <Bender> [ForbesTech] - Grammys Evolve: Recording Academy Taps YouTuber Connor Franta As New Member, Twitter Correspondent - http://www.forbes.com
[03:19:03] <Bender> [HackerNews] - FaceBook, PayPal and EBay’s Q1 Earnings Reports - http://techcrunch.com
[03:19:05] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[03:19:05] <Bender> [ForbesTech] - Galaxy S7 Leak Confirms 5 Brilliant New Features - http://www.forbes.com
[03:19:09] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[03:19:13] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[03:19:17] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[03:19:21] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[03:19:24] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[03:19:25] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[03:19:28] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[03:19:29] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[03:19:32] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[03:19:33] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[03:19:36] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[03:19:37] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[03:19:40] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[03:19:41] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[03:19:44] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[03:19:45] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[03:19:48] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[03:19:49] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[03:19:52] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[03:19:53] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[03:19:56] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[03:19:57] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[03:20:00] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[03:20:01] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[03:20:04] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[03:20:05] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[03:20:08] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[03:20:09] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[03:20:12] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[03:20:13] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[03:20:16] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[03:20:17] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[03:20:20] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[03:20:21] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[03:20:24] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[03:20:25] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[03:20:28] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[03:20:29] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[03:20:32] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[03:20:33] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[03:20:36] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[03:20:37] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[03:20:40] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[03:20:41] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[03:20:44] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[03:20:45] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[03:20:48] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[03:20:49] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[03:20:52] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[03:20:53] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[03:20:56] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[03:20:57] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[03:21:00] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[03:21:01] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[03:21:04] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[03:21:05] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[03:21:08] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[03:21:09] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[03:21:12] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[03:21:13] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[03:21:16] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[03:21:17] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[03:21:20] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[03:21:21] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[03:21:24] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[03:21:25] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[03:21:28] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[03:21:29] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[03:21:32] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[03:21:33] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[03:21:36] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[03:21:37] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[03:21:40] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[03:21:41] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[03:21:44] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[03:21:45] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[03:21:48] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[03:21:49] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[03:21:52] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[03:21:53] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[03:21:56] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[03:21:57] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[03:22:00] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[03:22:01] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[03:22:04] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[03:22:05] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[03:22:08] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[03:22:09] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[03:22:12] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[03:22:13] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[03:22:16] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[03:22:17] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[03:22:20] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[03:22:21] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[03:22:24] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[03:22:25] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[03:22:28] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[03:22:29] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[03:22:32] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[03:22:33] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[03:22:36] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[03:22:37] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[03:22:40] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[03:22:41] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[03:22:44] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[03:22:45] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[03:22:48] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[03:22:49] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[03:22:52] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[03:22:54] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[03:22:56] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[03:22:58] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[03:23:00] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[03:23:02] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[03:23:04] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[03:23:06] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[03:23:08] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[03:23:10] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[03:23:12] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[03:23:14] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[03:23:17] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[03:23:18] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[03:23:21] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[03:23:22] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[03:23:25] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[03:23:26] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[03:23:29] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[03:23:30] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[03:23:33] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[03:23:34] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[03:23:37] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[03:23:38] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[03:23:41] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[03:23:42] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[03:23:45] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[03:23:46] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[03:23:49] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[03:23:50] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[03:23:53] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[03:23:54] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[03:23:57] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[03:23:58] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[03:24:01] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[03:24:02] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[03:24:05] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[03:24:06] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[03:24:09] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[03:24:10] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[03:24:14] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[03:24:18] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[03:24:22] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[03:24:26] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[03:24:30] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[03:24:34] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[03:24:38] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[03:24:42] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[03:24:46] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[03:24:50] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[03:24:54] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[03:24:58] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[03:25:02] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[03:25:06] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[03:25:10] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[03:25:14] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[03:25:18] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[03:25:22] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[03:25:26] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[03:25:30] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[03:25:34] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[03:25:38] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[03:25:42] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[03:25:46] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[03:25:50] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[03:25:54] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[03:25:58] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[03:26:02] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[03:26:06] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[03:26:10] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[03:26:14] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[03:26:18] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[03:26:22] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[03:26:26] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[03:26:30] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[03:26:34] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[03:26:38] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[03:26:42] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[03:26:46] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[03:26:50] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[03:26:54] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[03:26:58] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[03:27:02] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[03:27:06] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[03:27:11] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[03:27:15] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[03:27:19] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[03:27:23] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[03:27:27] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[03:27:31] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[03:27:35] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[03:27:39] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[03:27:43] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[03:27:47] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[03:27:51] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[03:27:55] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[03:27:59] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[03:28:03] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[03:28:07] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[03:28:11] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[03:28:15] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[03:28:19] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[03:28:23] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[03:28:27] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[03:28:31] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[03:28:35] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[03:28:39] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[03:28:43] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[03:28:47] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[03:28:51] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[03:28:55] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[03:28:59] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[03:29:03] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[03:29:07] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[03:29:11] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[03:29:15] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[03:29:19] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[03:29:23] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[03:29:27] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[03:29:31] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[03:29:31] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[03:29:35] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[03:29:35] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[03:29:39] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[03:29:39] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[03:29:43] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[03:29:43] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[03:29:47] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[03:29:47] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[03:29:51] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[03:29:51] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[03:29:55] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[03:29:55] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[03:29:59] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[03:29:59] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[03:30:03] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[03:30:03] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[03:30:07] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[03:30:07] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[03:30:11] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[03:30:11] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[03:30:15] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[03:30:15] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[03:30:19] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[03:30:19] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[03:30:23] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[03:30:23] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[03:30:27] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[03:30:27] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[03:30:31] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[03:30:32] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[03:30:35] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[03:30:36] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[03:30:39] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[03:30:40] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[03:30:43] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[03:30:44] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[03:30:47] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[03:30:48] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[03:30:52] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[03:30:56] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[03:31:00] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[03:31:04] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[03:31:08] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[03:31:12] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[03:34:35] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[03:34:39] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[03:34:43] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[03:39:19] <Bender> [HackerNews] - Power laws as a thinking tool - https://www.facebook.com
[03:44:43] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[03:49:47] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[03:50:17] <Bender> [TheRegister] - Juniper turns around in 2015, worried about 2016 - http://go.theregister.com
[04:04:38] <Bender> [HackerNews] - Scientists open the ‘black box’ of schizophrenia with dramatic genetic discovery - https://www.washingtonpost.com
[04:10:19] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[04:10:23] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[04:10:28] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[04:10:29] <Bender> [TheRegister] - NSA’s top hacking boss explains how to protect your network from his attack squads - http://go.theregister.com
[04:10:32] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[04:10:36] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[04:10:40] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[04:10:44] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[04:10:48] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[04:10:52] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[04:10:56] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[04:11:00] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[04:11:04] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[04:11:08] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[04:11:12] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[04:11:16] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[04:11:20] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[04:11:24] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[04:11:28] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[04:11:32] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[04:11:36] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[04:11:40] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[04:11:44] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[04:11:48] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[04:11:52] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[04:11:56] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[04:12:00] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[04:12:04] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[04:12:08] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[04:12:12] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[04:12:16] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[04:12:20] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[04:12:24] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[04:12:28] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[04:12:32] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[04:12:36] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[04:12:40] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[04:12:44] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[04:12:48] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[04:12:52] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[04:12:56] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[04:13:00] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[04:13:04] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[04:13:08] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[04:13:12] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[04:13:16] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[04:13:20] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[04:13:24] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[04:13:28] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[04:13:32] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[04:13:36] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[04:13:40] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[04:13:44] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[04:13:48] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[04:13:52] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[04:13:56] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[04:14:00] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[04:14:04] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[04:14:08] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[04:14:12] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[04:14:16] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[04:14:20] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[04:14:24] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[04:14:28] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[04:14:32] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[04:14:36] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[04:14:41] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[04:14:45] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[04:14:45] <Bender> [HackerNews] - Data Privacy Day: Take Charge of Your Family’s Privacy - https://www.eff.org
[04:14:49] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[04:14:53] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[04:14:57] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[04:15:01] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[04:15:05] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[04:15:07] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[04:15:09] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[04:15:11] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[04:15:13] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[04:15:15] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[04:15:17] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[04:15:19] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[04:15:21] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[04:15:24] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[04:15:25] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[04:15:28] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[04:15:29] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[04:15:32] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[04:15:33] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[04:15:36] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[04:15:37] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[04:15:40] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[04:15:41] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[04:15:44] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[04:15:45] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[04:15:48] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[04:15:49] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[04:15:52] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[04:15:53] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[04:15:56] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[04:15:57] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[04:16:00] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[04:16:01] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[04:16:04] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[04:16:05] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[04:16:08] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[04:16:09] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[04:16:12] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[04:16:13] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[04:16:16] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[04:16:17] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[04:16:20] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[04:16:21] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[04:16:24] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[04:16:25] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[04:16:28] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[04:16:29] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[04:16:32] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[04:16:33] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[04:16:36] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[04:16:37] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[04:16:40] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[04:16:41] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[04:16:44] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[04:16:45] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[04:16:48] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[04:16:49] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[04:16:52] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[04:16:53] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[04:16:56] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[04:16:57] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[04:17:00] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[04:17:01] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[04:17:04] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[04:17:05] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[04:17:08] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[04:17:09] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[04:17:12] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[04:17:13] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[04:17:16] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[04:17:17] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[04:17:20] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[04:17:21] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[04:17:24] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[04:17:25] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[04:17:28] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[04:17:29] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[04:17:32] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[04:17:33] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[04:17:36] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[04:17:37] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[04:17:40] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[04:17:41] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[04:17:44] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[04:17:45] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[04:17:48] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[04:17:49] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[04:17:52] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[04:17:53] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[04:17:56] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[04:17:57] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[04:18:00] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[04:18:01] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[04:18:04] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[04:18:05] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[04:18:08] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[04:18:09] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[04:18:12] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[04:18:13] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[04:18:16] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[04:18:17] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[04:18:20] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[04:18:21] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[04:18:24] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[04:18:25] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[04:18:28] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[04:18:29] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[04:18:32] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[04:18:33] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[04:18:36] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[04:18:37] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[04:18:40] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[04:18:41] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[04:18:44] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[04:18:45] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[04:18:48] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[04:18:49] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[04:18:52] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[04:18:53] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[04:18:56] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[04:18:57] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[04:19:00] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[04:19:01] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[04:19:04] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[04:19:06] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[04:19:08] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[04:19:10] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[04:19:12] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[04:19:14] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[04:19:16] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[04:19:18] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[04:19:20] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[04:19:22] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[04:19:24] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[04:19:26] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[04:19:28] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[04:19:30] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[04:19:32] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[04:19:34] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[04:19:36] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[04:19:38] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[04:19:40] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[04:19:42] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[04:19:44] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[04:19:46] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[04:19:49] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[04:19:49] <Bender> [HackerNews] - 25 Civil Liberties Orgs Call for Open Hearings on Section 702 Surveillance - https://www.eff.org
[04:19:50] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[04:19:53] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[04:19:54] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[04:19:58] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[04:20:02] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[04:20:06] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[04:20:10] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[04:20:14] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[04:20:18] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[04:20:22] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:20:26] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[04:20:30] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[04:20:34] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[04:20:38] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[04:20:42] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[04:20:46] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[04:20:50] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[04:20:54] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[04:20:58] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[04:21:02] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[04:21:06] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[04:21:10] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[04:21:14] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[04:21:18] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[04:21:22] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[04:21:26] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[04:21:30] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[04:21:34] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:21:38] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[04:21:42] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[04:21:46] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[04:21:50] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[04:21:54] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[04:21:58] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[04:22:02] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[04:22:06] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[04:22:10] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:22:14] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[04:22:18] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[04:22:22] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[04:22:26] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[04:22:30] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[04:22:34] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[04:22:38] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[04:22:42] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[04:22:46] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[04:22:50] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[04:22:55] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[04:22:59] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[04:23:03] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[04:23:07] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[04:23:11] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[04:23:15] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[04:23:19] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[04:23:23] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[04:23:27] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[04:23:31] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[04:23:35] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[04:23:39] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[04:23:43] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[04:23:47] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[04:23:51] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[04:23:55] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[04:23:59] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[04:24:03] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[04:24:07] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[04:24:11] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[04:24:15] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[04:24:19] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[04:24:23] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[04:24:27] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[04:24:31] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[04:24:35] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[04:24:39] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[04:24:43] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[04:24:47] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[04:24:51] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[04:24:55] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[04:24:59] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[04:25:03] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[04:25:07] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[04:25:11] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[04:25:14] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[04:25:15] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[04:25:18] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[04:25:19] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[04:25:22] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[04:25:23] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[04:25:26] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[04:25:27] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[04:25:30] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[04:25:31] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[04:25:34] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[04:25:35] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[04:25:38] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[04:25:39] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[04:25:42] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[04:25:43] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[04:25:46] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[04:25:47] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[04:25:50] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[04:25:51] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[04:25:54] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[04:25:55] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[04:25:58] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[04:25:59] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[04:26:02] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[04:26:03] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[04:26:06] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[04:26:07] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[04:26:10] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[04:26:11] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[04:26:14] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[04:26:15] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[04:26:18] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[04:26:19] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[04:26:22] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[04:26:23] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[04:26:26] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[04:26:27] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[04:26:30] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[04:26:31] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[04:26:34] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[04:26:35] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[04:26:38] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[04:26:39] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[04:26:42] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[04:26:43] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[04:26:46] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[04:26:47] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[04:26:50] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[04:26:54] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[04:30:18] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[04:30:22] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[04:30:26] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[04:35:22] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[04:35:50] <Bender> [SoylentNews] - Prank Website Causes Safari to Crash and Forces iPhones and iPads to Reboot - http://sylnt.us
[04:40:07] <Bender> [ITWorld] - Google's VirusTotal now picks out suspicious firmware - http://www.itworld.com
[04:40:26] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[04:40:30] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[04:40:34] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[04:40:38] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[04:40:42] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[04:40:46] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[04:40:51] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[04:40:55] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[04:40:59] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[04:41:03] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[04:41:07] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[04:41:11] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[04:41:15] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[04:41:19] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[04:41:23] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[04:41:27] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[04:41:31] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[04:41:35] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[04:41:39] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[04:41:43] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[04:41:47] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[04:41:51] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[04:41:55] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[04:41:59] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[04:42:03] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[04:42:07] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[04:42:11] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[04:42:15] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[04:42:19] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[04:42:23] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[04:42:27] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[04:42:31] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[04:42:35] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[04:42:39] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[04:42:43] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[04:42:47] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[04:42:51] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[04:42:55] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[04:42:59] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[04:43:03] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[04:43:07] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[04:43:11] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[04:43:15] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[04:43:19] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[04:43:23] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[04:43:27] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[04:43:31] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[04:43:35] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[04:43:39] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[04:43:43] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[04:43:47] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[04:43:51] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[04:43:55] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[04:43:59] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[04:44:03] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[04:44:07] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[04:44:11] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[04:44:15] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[04:44:19] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[04:44:23] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[04:44:27] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[04:44:31] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[04:44:35] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[04:44:39] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[04:44:43] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[04:44:48] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[04:44:52] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[04:44:56] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[04:45:00] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[04:45:04] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[04:45:08] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[04:45:12] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[04:45:16] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[04:45:20] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[04:45:24] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[04:45:28] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[04:45:29] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[04:45:32] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[04:45:33] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[04:45:36] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[04:45:37] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[04:45:40] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[04:45:41] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[04:45:44] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[04:45:45] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[04:45:48] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[04:45:49] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[04:45:52] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[04:45:53] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[04:45:56] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[04:45:57] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[04:46:00] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[04:46:01] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[04:46:04] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[04:46:05] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[04:46:08] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[04:46:09] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[04:46:12] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[04:46:13] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[04:46:16] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[04:46:17] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[04:46:20] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[04:46:22] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[04:46:24] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[04:46:26] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[04:46:28] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[04:46:30] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[04:46:32] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[04:46:34] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[04:46:36] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[04:46:38] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[04:46:40] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[04:46:42] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[04:46:44] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[04:46:46] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[04:46:48] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[04:46:50] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[04:46:52] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[04:46:54] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[04:46:56] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[04:46:58] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[04:47:00] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[04:47:02] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[04:47:04] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[04:47:06] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[04:47:08] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[04:47:10] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[04:47:12] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[04:47:14] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[04:47:16] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[04:47:18] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[04:47:20] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[04:47:22] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[04:47:24] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[04:47:26] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[04:47:28] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[04:47:30] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[04:47:32] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[04:47:34] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[04:47:36] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[04:47:38] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[04:47:40] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[04:47:42] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[04:47:44] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[04:47:46] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[04:47:48] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[04:47:50] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[04:47:52] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[04:47:54] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[04:47:56] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[04:47:58] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[04:48:00] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[04:48:02] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[04:48:04] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[04:48:06] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[04:48:08] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[04:48:10] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[04:48:12] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[04:48:14] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[04:48:16] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[04:48:18] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[04:48:20] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[04:48:22] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[04:48:24] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[04:48:26] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[04:48:28] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[04:48:30] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[04:48:32] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[04:48:34] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[04:48:36] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[04:48:38] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[04:48:40] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[04:48:42] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[04:48:44] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[04:48:46] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[04:48:48] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[04:48:50] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[04:48:52] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[04:48:54] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[04:48:57] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[04:48:58] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[04:49:01] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[04:49:02] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[04:49:05] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[04:49:06] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[04:49:09] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[04:49:10] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[04:49:13] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[04:49:14] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[04:49:17] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[04:49:18] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[04:49:21] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[04:49:22] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[04:49:25] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[04:49:26] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[04:49:29] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[04:49:30] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[04:49:33] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[04:49:34] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[04:49:37] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[04:49:38] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[04:49:41] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[04:49:42] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[04:49:45] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[04:49:46] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[04:49:49] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[04:49:50] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[04:49:53] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[04:49:54] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[04:49:57] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[04:49:58] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[04:50:01] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[04:50:02] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[04:50:05] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[04:50:06] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[04:50:09] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[04:50:10] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[04:50:12] <Bender> [HackerNews] - Overpass Web Front from Redhat - http://overpassfont.org
[04:50:13] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[04:50:14] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[04:50:17] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[04:50:21] <Bender> [MITTech] - NSA Hacking Chief: Internet of Things Security Keeps Me Up at Night - http://www.technologyreview.com
[04:50:21] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[04:50:25] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[04:50:29] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[04:50:33] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:50:37] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[04:50:41] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[04:50:45] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[04:50:49] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[04:50:53] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[04:50:57] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[04:51:01] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[04:51:05] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[04:51:09] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[04:51:13] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[04:51:17] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[04:51:21] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[04:51:25] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[04:51:29] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[04:51:33] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[04:51:37] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[04:51:41] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[04:51:45] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:51:49] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[04:51:53] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[04:51:57] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[04:52:01] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[04:52:05] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[04:52:09] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[04:52:13] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[04:52:17] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[04:52:21] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[04:52:25] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[04:52:29] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[04:52:33] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[04:52:37] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[04:52:41] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[04:52:45] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[04:52:49] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[04:52:53] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[04:52:57] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[04:53:01] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[04:53:05] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[04:53:09] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[04:53:13] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[04:53:17] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[04:53:21] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[04:53:25] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[04:53:29] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[04:53:34] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[04:53:38] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[04:53:42] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[04:53:46] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[04:53:50] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[04:53:54] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[04:53:58] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[04:54:02] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[04:54:06] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[04:54:10] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[04:54:14] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[04:54:18] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[04:54:22] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[04:54:26] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[04:54:30] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[04:54:34] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[04:54:38] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[04:54:42] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[04:54:46] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[04:54:50] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[04:54:54] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[04:54:58] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[04:55:02] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[04:55:06] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[04:55:10] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[04:55:14] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[04:55:18] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[04:55:22] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[04:55:26] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[04:55:30] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[04:55:34] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[04:55:37] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[04:55:38] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[04:55:41] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[04:55:42] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[04:55:45] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[04:55:46] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[04:55:49] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[04:55:50] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[04:55:53] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[04:55:54] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[04:55:57] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[04:55:58] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[04:56:01] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[04:56:02] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[04:56:05] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[04:56:06] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[04:56:09] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[04:56:10] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[04:56:13] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[04:56:14] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[04:56:17] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[04:56:18] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[04:56:21] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[04:56:22] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[04:56:25] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[04:56:26] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[04:56:29] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[04:56:30] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[04:56:33] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[04:56:34] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[04:56:37] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[04:56:38] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[04:56:41] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[04:56:42] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[04:56:45] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[04:56:46] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[04:56:49] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[04:56:50] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[04:56:53] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[04:56:54] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[04:56:57] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[04:56:58] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[04:57:01] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[04:57:05] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[04:57:09] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[04:57:13] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[04:57:17] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[05:00:20] <Bender> [HackerNews] - The anatomy of an ssh session - http://necrux.com
[05:00:56] <Bender> [PhysOrg] - Daughters of interracial parents more likely than sons to identify as multiracial - http://phys.org
[05:01:08] <Bender> [TheRegister] - 'Critical' Israel power grid attack was just boring ransomware - http://go.theregister.com
[05:05:24] <Bender> [HackerNews] - Cops hate encryption but the NSA loves it when you use PGP - http://www.theregister.co.uk
[05:05:28] <Bender> [HackerNews] - Overpass Web Front from Red Hat - http://overpassfont.org
[05:05:45] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[05:05:49] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[05:05:53] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[05:06:06] <Bender> [SecurityWeek] - LeChiffre Ransomware Hits Indian Banks, Pharma Company - http://feedproxy.google.com
[05:06:13] <Bender> [SoylentNews] - Github Struggling with Network Outage; Appears to have Recovered - http://sylnt.us
[05:07:15] Bytram is now known as Bytram|away
[05:10:30] <Bender> [ITWorld] - Smartphone growth at lowest on concerns about global economy, saturation in China - http://www.itworld.com
[05:10:49] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[05:15:53] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[05:15:57] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[05:16:01] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[05:16:05] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[05:16:09] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[05:16:13] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[05:16:17] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[05:16:21] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[05:16:25] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[05:16:29] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[05:16:33] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[05:16:37] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[05:16:41] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[05:16:45] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[05:16:49] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[05:16:53] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[05:16:57] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[05:17:01] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[05:17:05] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[05:17:09] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[05:17:13] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[05:17:17] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[05:17:21] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[05:17:25] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[05:17:29] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[05:17:33] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[05:17:37] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[05:17:41] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[05:17:45] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[05:17:49] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[05:17:53] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[05:17:57] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[05:18:01] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[05:18:05] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[05:18:09] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[05:18:13] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[05:18:17] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[05:18:21] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[05:18:25] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[05:18:29] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[05:18:33] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[05:18:37] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[05:18:41] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[05:18:45] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[05:18:49] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[05:18:53] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[05:18:57] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[05:19:01] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[05:19:05] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[05:19:09] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[05:19:13] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[05:19:17] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[05:19:21] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[05:19:26] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[05:19:30] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[05:19:34] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[05:19:38] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[05:19:42] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[05:19:46] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[05:19:50] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[05:19:54] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[05:19:58] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[05:20:02] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[05:20:06] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[05:20:10] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[05:20:14] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[05:20:18] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[05:20:22] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[05:20:26] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[05:20:30] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[05:20:34] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[05:20:34] <Bender> [ForbesTech] - Cloud, Mobile, And Big Data Analytics Drive Latest Rounds of Megadeals - http://www.forbes.com
[05:20:38] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[05:20:42] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[05:20:46] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[05:20:50] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[05:20:54] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[05:20:56] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[05:20:58] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[05:21:00] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[05:21:02] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[05:21:04] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[05:21:06] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[05:21:08] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[05:21:10] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[05:21:12] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[05:21:14] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[05:21:16] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[05:21:18] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[05:21:20] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[05:21:22] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[05:21:24] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[05:21:26] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[05:21:28] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[05:21:30] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[05:21:32] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[05:21:34] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[05:21:36] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[05:21:38] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[05:21:40] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[05:21:42] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[05:21:44] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[05:21:46] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[05:21:48] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[05:21:50] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[05:21:52] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[05:21:54] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[05:21:56] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[05:21:58] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[05:22:00] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[05:22:02] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[05:22:05] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[05:22:06] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[05:22:09] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[05:22:10] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[05:22:13] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[05:22:14] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[05:22:17] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[05:22:18] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[05:22:21] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[05:22:22] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[05:22:25] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[05:22:26] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[05:22:29] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[05:22:30] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[05:22:33] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[05:22:34] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[05:22:37] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[05:22:38] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[05:22:41] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[05:22:42] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[05:22:45] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[05:22:46] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[05:22:49] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[05:22:50] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[05:22:53] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[05:22:54] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[05:22:57] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[05:22:58] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[05:23:01] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[05:23:02] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[05:23:05] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[05:23:06] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[05:23:09] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[05:23:10] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[05:23:13] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[05:23:14] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[05:23:17] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[05:23:18] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[05:23:21] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[05:23:22] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[05:23:25] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[05:23:26] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[05:23:29] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[05:23:30] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[05:23:33] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[05:23:35] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[05:23:37] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[05:23:39] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[05:23:41] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[05:23:43] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[05:23:45] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[05:23:47] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[05:23:49] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[05:23:51] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[05:23:53] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[05:23:55] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[05:23:57] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[05:23:59] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[05:24:01] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[05:24:03] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[05:24:05] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[05:24:07] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[05:24:09] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[05:24:11] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[05:24:13] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[05:24:15] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[05:24:17] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[05:24:19] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[05:24:21] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[05:24:23] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[05:24:25] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[05:24:27] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[05:24:29] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[05:24:31] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[05:24:33] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[05:24:35] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[05:24:37] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[05:24:39] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[05:24:41] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[05:24:43] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[05:24:45] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[05:24:47] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[05:24:49] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[05:24:51] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[05:24:53] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[05:24:55] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[05:24:57] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[05:24:59] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[05:25:01] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[05:25:03] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[05:25:05] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[05:25:07] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[05:25:09] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[05:25:11] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[05:25:13] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[05:25:15] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[05:25:17] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[05:25:19] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[05:25:21] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[05:25:23] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[05:25:25] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[05:25:27] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[05:25:29] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[05:25:31] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[05:25:33] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[05:25:35] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[05:25:37] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[05:25:39] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[05:25:41] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[05:25:43] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[05:25:47] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[05:25:51] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[05:25:55] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[05:25:59] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[05:26:00] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[05:26:03] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[05:26:04] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[05:26:07] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[05:26:08] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[05:26:11] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[05:26:12] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[05:26:15] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[05:26:16] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[05:26:19] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[05:26:20] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[05:26:23] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[05:26:24] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[05:26:27] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[05:26:28] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[05:26:31] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[05:26:32] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[05:26:35] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[05:26:36] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[05:26:39] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[05:26:40] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[05:26:43] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[05:26:44] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[05:26:47] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[05:26:48] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[05:26:51] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[05:26:52] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[05:26:55] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[05:26:56] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[05:26:59] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[05:27:00] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[05:27:03] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[05:27:04] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[05:27:07] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[05:27:08] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[05:27:11] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[05:27:12] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[05:27:15] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[05:27:16] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[05:27:19] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[05:27:20] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[05:27:23] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[05:27:24] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[05:27:27] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[05:27:28] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[05:27:31] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[05:27:32] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[05:27:35] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[05:27:36] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[05:27:39] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[05:27:41] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[05:27:43] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[05:27:47] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[05:27:51] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[05:27:55] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[05:27:59] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[05:28:03] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[05:28:07] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[05:28:12] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[05:28:16] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[05:28:20] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[05:28:24] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[05:28:28] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[05:28:32] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[05:28:36] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[05:28:40] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[05:28:44] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[05:28:48] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[05:28:52] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[05:28:56] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[05:29:00] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[05:29:04] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[05:29:08] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[05:29:12] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[05:29:16] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[05:29:20] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[05:29:24] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[05:29:28] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[05:29:32] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[05:29:36] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[05:29:40] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[05:29:44] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[05:29:48] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[05:29:52] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[05:29:56] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[05:30:00] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[05:30:04] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[05:30:08] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[05:30:12] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[05:30:16] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[05:30:20] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[05:30:24] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[05:30:28] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[05:30:32] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[05:30:36] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[05:30:40] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[05:30:44] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[05:30:48] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[05:30:52] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[05:30:56] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[05:31:00] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[05:31:04] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[05:31:05] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[05:31:08] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[05:31:09] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[05:31:12] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[05:31:13] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[05:31:16] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[05:31:20] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[05:31:24] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[05:31:29] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[05:31:33] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[05:31:37] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[05:31:41] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[05:31:45] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[05:31:49] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[05:31:53] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[05:31:57] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[05:32:01] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[05:32:05] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[05:32:09] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[05:32:13] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[05:32:17] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[05:32:21] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[05:32:25] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[05:36:08] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[05:36:29] <Bender> [SecurityWeek] - What is the Real Cost of "Good Enough" Security? - http://feedproxy.google.com
[05:36:33] <Bender> [SecurityWeek] - Samsung Patches Critical Vulnerabilities in Android Devices - http://feedproxy.google.com
[05:36:34] <Bender> [TheRegister] - Angler exploit kit now hooking execs with Xmas Flash hole - http://go.theregister.com
[05:40:51] <Bender> [HackerNews] - Build the Future Faster PlanGrid (YC W12) as a PM, Designer or Engineer - http://www.plangrid.com
[05:45:55] <Bender> [HackerNews] - America's Sudden U-Turn on Highway Fonts - http://www.citylab.com
[05:45:59] <Bender> [HackerNews] - Newegg sues patent troll that dropped its case - http://arstechnica.com
[05:46:03] <Bender> [HackerNews] - Build the Future Faster at PlanGrid (YC W12) as a PM, Designer or Engineer - http://www.plangrid.com
[05:46:16] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[05:50:57] <Bender> [ForbesTech] - Arrow Season 4 - http://www.forbes.com
[05:50:59] <Bender> [HackerNews] - Head of Navy intelligence hasn't been allowed to see military secrets for years - https://www.washingtonpost.com
[05:51:01] <Bender> [ForbesTech] - 'Arrow' Season 4, Episode 11 Review: A.W.O.L. - http://www.forbes.com
[06:01:54] <Bender> [TheRegister] - CableLabs certifies first gigabit-class cable modems - http://go.theregister.com
[06:06:11] <Bender> [HackerNews] - To prevent back pain orthotics are out exercise is in - http://well.blogs.nytimes.com
[06:06:15] <Bender> [HackerNews] - Mobile Video Player SDK Written in Swift - http://sylnt.us
[06:11:35] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[06:11:39] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[06:11:43] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[06:11:47] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[06:11:51] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[06:11:55] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[06:11:59] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[06:12:03] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[06:12:07] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[06:12:11] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[06:12:15] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[06:12:19] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[06:12:23] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[06:12:27] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[06:12:31] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[06:12:35] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[06:12:39] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[06:12:43] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[06:12:48] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[06:12:52] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[06:12:56] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[06:13:00] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[06:13:04] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[06:13:08] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[06:13:12] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[06:13:16] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[06:13:20] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[06:13:24] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[06:13:28] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[06:13:32] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[06:13:36] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[06:13:40] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[06:13:44] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[06:13:48] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[06:13:52] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[06:13:56] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[06:14:00] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[06:14:04] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[06:14:08] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[06:14:12] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[06:14:16] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[06:14:20] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[06:14:24] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[06:14:28] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[06:14:32] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[06:14:36] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[06:14:40] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[06:14:44] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[06:14:48] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[06:14:52] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[06:14:56] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[06:15:00] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[06:15:04] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[06:15:08] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[06:15:12] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[06:15:16] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[06:15:20] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[06:15:24] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[06:15:28] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[06:15:32] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[06:15:36] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[06:15:40] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[06:15:44] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[06:15:48] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[06:15:52] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[06:15:56] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[06:16:00] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[06:16:04] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[06:16:08] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[06:16:12] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[06:16:16] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[06:16:18] <Bender> [HackerNews] - Facebook enters transport business with Uber - http://www.bbc.com
[06:16:20] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[06:16:22] <Bender> [HackerNews] - Automation potential and wages for US jobs - https://public.tableau.com!/vizhome/AutomationandUSjobs/Technicalpotentialforautomation
[06:16:24] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[06:16:26] <Bender> [HackerNews] - Ask HN: What should replace XMPP? - https://news.ycombinator.com
[06:16:28] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[06:16:32] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[06:16:36] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[06:16:39] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up ? Public Comments Welcomed - http://www.nist.gov
[06:16:41] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[06:16:43] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[06:16:45] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[06:16:47] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[06:16:49] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[06:16:51] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[06:16:53] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[06:16:55] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[06:16:57] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[06:16:59] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[06:17:01] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[06:17:03] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[06:17:05] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[06:17:07] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[06:17:09] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[06:17:11] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[06:17:13] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[06:17:15] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[06:17:17] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[06:17:19] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[06:17:21] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[06:17:23] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[06:17:25] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[06:17:27] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[06:17:29] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[06:17:31] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[06:17:33] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[06:17:35] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[06:17:37] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[06:17:39] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[06:17:41] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[06:17:43] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[06:17:45] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[06:17:47] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[06:17:49] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[06:17:51] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[06:17:53] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[06:17:55] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[06:17:57] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[06:17:59] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[06:18:01] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[06:18:03] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[06:18:05] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[06:18:07] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[06:18:09] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[06:18:11] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[06:18:13] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[06:18:15] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[06:18:17] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[06:18:19] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[06:18:21] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[06:18:23] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[06:18:25] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[06:18:27] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[06:18:29] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[06:18:31] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[06:18:33] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[06:18:35] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[06:18:37] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[06:18:39] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[06:18:41] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[06:18:43] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[06:18:45] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[06:18:47] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[06:18:49] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[06:18:51] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[06:18:53] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[06:18:55] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[06:18:57] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[06:18:59] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[06:19:01] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[06:19:03] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[06:19:05] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[06:19:07] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[06:19:09] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[06:19:11] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[06:19:13] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[06:19:15] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[06:19:17] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[06:19:19] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[06:19:21] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[06:19:23] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[06:19:25] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[06:19:27] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[06:19:29] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[06:19:32] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[06:19:33] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[06:19:36] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[06:19:37] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[06:19:40] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[06:19:41] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[06:19:44] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[06:19:45] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[06:19:48] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[06:19:49] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[06:19:52] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[06:19:53] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[06:19:56] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[06:19:57] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[06:20:00] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[06:20:01] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[06:20:04] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[06:20:05] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[06:20:08] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[06:20:09] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[06:20:12] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[06:20:13] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[06:20:16] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[06:20:17] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[06:20:20] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[06:20:21] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[06:20:24] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[06:20:25] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[06:20:28] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[06:20:29] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[06:20:32] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[06:20:33] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[06:20:36] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[06:20:38] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[06:20:40] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[06:20:42] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[06:20:44] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[06:20:46] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[06:20:48] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[06:20:50] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[06:20:52] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[06:20:54] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[06:20:56] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[06:20:58] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[06:21:00] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[06:21:02] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[06:21:04] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[06:21:06] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[06:21:08] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[06:21:10] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[06:21:12] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[06:21:14] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[06:21:16] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[06:21:18] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[06:21:20] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[06:21:22] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[06:21:22] <Bender> [HackerNews] - The Useless Agony of Going Offline - http://www.newyorker.com
[06:21:24] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[06:21:26] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[06:21:30] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[06:21:34] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[06:21:38] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:21:42] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[06:21:43] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[06:21:46] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[06:21:47] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[06:21:50] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[06:21:51] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[06:21:54] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[06:21:55] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[06:21:58] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[06:21:59] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[06:22:02] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[06:22:03] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[06:22:06] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[06:22:07] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[06:22:10] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[06:22:11] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[06:22:14] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[06:22:15] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[06:22:18] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[06:22:19] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[06:22:22] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[06:22:23] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[06:22:26] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[06:22:27] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[06:22:30] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[06:22:31] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[06:22:34] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[06:22:35] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[06:22:38] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[06:22:39] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[06:22:42] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[06:22:43] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[06:22:46] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[06:22:47] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[06:22:50] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:22:51] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[06:22:54] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[06:22:55] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[06:22:58] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[06:22:59] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[06:23:02] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[06:23:03] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[06:23:06] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[06:23:07] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[06:23:10] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[06:23:11] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[06:23:14] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[06:23:15] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[06:23:18] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[06:23:19] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[06:23:22] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[06:23:23] <Bender> [NISTIT] - Influence the Future of Cybersecurity Education?Join the NICE Working Group - http://www.nist.gov
[06:23:26] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[06:23:30] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[06:23:34] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[06:23:38] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[06:23:42] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[06:23:46] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[06:23:50] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[06:23:54] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[06:23:58] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[06:24:02] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[06:24:06] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[06:24:10] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[06:24:14] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[06:24:18] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[06:24:22] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[06:24:26] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[06:24:30] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[06:24:34] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[06:24:38] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[06:24:42] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[06:24:46] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[06:24:50] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[06:24:54] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[06:24:58] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[06:25:02] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[06:25:06] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[06:25:11] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[06:25:15] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[06:25:19] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[06:25:23] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[06:25:27] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[06:25:31] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[06:25:35] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[06:25:39] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[06:25:43] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[06:25:47] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[06:25:51] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[06:25:55] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[06:25:59] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[06:26:03] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[06:26:07] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[06:26:11] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[06:26:15] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[06:26:19] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[06:26:23] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[06:26:24] <Bender> [ForbesTech] - Six Steps To Adapt To The Future Of Work - http://www.forbes.com
[06:26:27] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[06:26:31] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[06:26:35] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[06:26:39] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[06:26:43] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[06:26:47] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[06:26:47] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[06:26:51] <Bender> [NISTIT] - MINEX III Results - http://www.nist.gov
[06:26:51] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[06:26:55] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[06:26:55] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[06:26:59] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[06:27:03] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[06:27:07] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[06:27:11] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[06:27:15] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[06:27:19] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[06:27:23] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[06:27:27] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[06:27:31] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[06:27:35] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[06:27:39] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[06:27:43] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[06:27:47] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[06:27:51] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[06:27:55] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[06:27:59] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[06:28:03] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[06:36:54] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[06:37:21] <Bender> [TheRegister] - TalkTalk CuffCuffs ScamScam CrimCrims - http://go.theregister.com
[06:37:22] <Bender> [SoylentNews] - The Aliens are Silent Because They're Dead - http://sylnt.us
[06:41:38] <Bender> [HackerNews] - GrabTaxi Rebrands to Grab, Launches Cashless Payments and Corporate Service - http://techcrunch.com
[06:41:58] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[06:46:40] <Bender> [ForbesTech] - Highlights from StartmeupHK Venture Forum with Elon Musk: Why Hong Kong Is Great for Entrepreneurs - http://www.forbes.com
[06:46:41] <Bender> [HackerNews] - How can you help Flint? Don't send bottled water - http://michaelmoore.com
[06:46:45] <Bender> [HackerNews] - To Prevent Back Pain, Orthotics Are Out, Exercise Is In - http://well.blogs.nytimes.com
[06:47:02] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[06:47:06] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[06:47:10] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[06:47:14] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[06:47:18] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[06:47:22] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[06:47:26] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[06:47:30] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[06:47:34] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[06:47:38] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[06:47:42] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[06:47:46] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[06:47:50] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[06:47:54] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[06:47:59] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[06:48:03] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[06:48:07] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[06:48:11] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[06:48:15] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[06:48:19] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[06:48:23] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[06:48:27] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[06:48:31] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[06:48:35] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[06:48:39] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[06:48:43] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[06:48:47] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[06:48:51] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[06:48:55] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[06:48:59] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[06:49:03] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[06:49:07] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[06:49:11] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[06:49:15] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[06:49:19] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[06:49:23] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[06:49:27] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[06:49:31] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[06:49:35] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[06:49:39] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[06:49:43] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[06:49:47] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[06:49:51] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[06:49:55] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[06:49:59] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[06:50:03] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[06:50:07] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[06:50:11] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[06:50:15] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[06:50:19] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[06:50:23] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[06:50:27] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[06:50:31] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[06:50:35] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[06:50:39] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[06:50:43] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[06:50:47] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[06:50:51] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[06:50:55] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[06:50:59] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[06:51:03]