NIST is chipping away at NVD backlog
The National Institute of Standards and Technology (NIST) is clearing the backlog of unprocessed CVE-numbered vulnerabilities in the National Vulnerability Database (NVD), but has admitted that their initial estimate of when they would finish the job.....»»
Things still aren’t looking good for Apple’s iOS 19 update
Following the slow rollout of iOS 18, iOS 19 might face similar delays as engineers face a backlog of work on iOS 18 features......»»
NIST report on hardware security risks reveals 98 failure scenarios
NIST’s latest report, “Hardware Security Failure Scenarios: Potential Hardware Weaknesses” (NIST IR 8517), explores the hidden vulnerabilities in computer hardware, a domain often considered more secure than software. The report hig.....»»
NIST is chipping away at NVD backlog
The National Institute of Standards and Technology (NIST) is clearing the backlog of unprocessed CVE-numbered vulnerabilities in the National Vulnerability Database (NVD), but has admitted that their initial estimate of when they would finish the job.....»»
Novel protocols for estimating Hamiltonian parameters of a superconducting quantum processor could improve precision
Researchers at Freie Universität Berlin, University of Maryland and NIST, Google AI, and Abu Dhabi set out to robustly estimate the free Hamiltonian parameters of bosonic excitations in a superconducting quantum simulator. The protocols they develop.....»»
Auto industry risks from port strike to rise exponentially each day, analysts say
One day after the port strike on the East and Gulf coasts began, the backlog of automotive parts that some suppliers and automakers import into the U.S. grew by about a week, according to an industry trade expert......»»
NIST proposes barring some of the most nonsensical password rules
Proposed guidelines aim to inject badly needed common sense into password hygiene. Enlarge (credit: Getty Images) The National Institute of Standards and Technology (NIST), the federal body that sets technology standards.....»»
This handy video game tracker will help tame your backlog
Need a way to organize your backlog and wish list, all while keeping track of every video game you play? Try this free tool......»»
If you love Astro Bot, try this excellent new platformer next
If Astro Bot has you looking for more old-school platformers, Grapple Dogs: Cosmic Canines should be the next game on your backlog......»»
Proofpoint launches NIST-inspired framework to tackle data loss prevention challenges
Proofpoint launched a proprietary, partner-friendly, end-to-end information protection framework, providing organizations access to expertise, industry benchmark data and proven methodology in designing, implementing and maturing data loss prevention.....»»
New Sisyphus cooling technique could enhance precision of atomic clocks
Researchers in the Neutral Atom Optical Clocks Group at the National Institute of Standards and Technology (NIST), University of Colorado and Pennsylvania State University recently devised a new sub-recoil Sisyphus cooling technique that could help t.....»»
NIST releases finalized post-quantum encryption standards
NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. The announced algorithms are specified in the first completed standards from NIST’s post-quantum cryptography (PQC) standardiz.....»»
New hemp reference material will help ensure accurate cannabis measurements
The National Institute of Standards and Technology (NIST) is now selling a hemp reference material that will help laboratories accurately measure key components in cannabis plant products. This will help law enforcement agencies accurately distinguis.....»»
NIST says NVD will be back on track by September 2024
The National Institute of Standards and Technology (NIST) has awarded a contract for an unnamed company/organization to help them process incoming Common Vulnerabilities and Exposures (CVEs) for inclusion in the National Vulnerability Database (NVD),.....»»
NIST unveils ARIA to evaluate and verify AI capabilities, impacts
The National Institute of Standards and Technology (NIST) is launching a new testing, evaluation, validation and verification (TEVV) program intended to help improve understanding of artificial intelligence’s capabilities and impacts. Assessing Ris.....»»
The evolution of security metrics for NIST CSF 2.0
CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or single indicators — vulnerabilities detected, percentage of vulnerabilities.....»»
After you die, your Steam games will be stuck in legal limbo
So much for your descendants posthumously clearing out that massive backlog... Enlarge / But... but I was just about to check out Tacoma. (credit: Getty Images) With Valve's Steam gaming platform approaching the US drink.....»»
CISA starts CVE “vulnrichment” program
The US Cybersecurity and Infrastructure Agency (CISA) has announced the creation of “Vulnrichment,” a new project that aims to fill the CVE enrichment gap created by NIST National Vulnerability Database’s recent slowdown. NVD is fai.....»»
CyberSaint releases NIST CSF Benchmarking Feature
CyberSaint released the NIST Cybersecurity Framework (CSF) Benchmarking Feature, which allows CISOs and security teams to measure their NIST posture against industry peers through a historical maturity graph on the CyberStrong Executive Dashboard. Or.....»»
The big quantum chill: Scientists modify common lab refrigerator to cool faster with less energy
By modifying a refrigerator commonly used in both research and industry, researchers at the National Institute of Standards and Technology (NIST) have drastically reduced the time and energy required to cool materials to within a few degrees above ab.....»»
PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497)
A vulnerability (CVE-2024-31497) in PuTTY, a popular SSH and Telnet client, could allow attackers to recover NIST P-521 client keys due to the “heavily biased” ECDSA nonces (random values used once), researchers have discovered. “To.....»»