hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

8.9K
active users

#nist

3 posts3 participants0 posts today

Almost a dozen top cybersecurity experts from the US National Institutes of Standards and Technology (NIST) have taken the administration's retirement offers and are leaving the agency

According to CybersecurityDive, the experts had worked in #NIST Computer Security Division (CSD)

Their retirement will impact NIST's capacity to deliver standards for emerging technologies like quantum computing and artificial intelligence
cybersecuritydive.com/news/nis

Cybersecurity Dive · NIST loses key cyber experts in standards and researchBy Eric Geller
Replied in thread

@jens nodds in agreement

Older standards do get declared deprecated, but that means they'll remain in the books still to reference for historical reasons.

  • OFC a newer standard gets written and then oreambled to replace older ones.

This has been the norm for everyone regsrdless if DIN, ISO, IEC, IEEE or IETF....

  • After all, one may face something as per revious standard and may need the correct source to reference for it.

Imagine if IEC decided to basically scrap all other AC power connectors but IEC 6320 C19/C20, IEC60906-1 & IEC60309 125A 400 V 3L+N+PE 6h and tell electricians to "GTFO!" when it comes to anything else.

  • #NIST turning themselves into willingful helpers of #Trump makes them less reliable (or rather unreliable) and thus erodes the #USA in terms of #Standards!

This is worse than what the Nazis did with DIN, cuz even they didn't fuck with standardization AFAIK!

en.wikipedia.orgIEC 60320 - Wikipedia

Death by a 1000 Paper Cuts...

Numerous US federal agencies that contribute to our national cybersecurity defenses have suffered sweeping job and program cuts. These cutbacks put the US at a disadvantage in its efforts to mitigate cybercrimes, cyber espionage, and other cyber-enabled attacks by criminal and state (sponsored) actors.

Political pundits at The Bulwark are much better informed than I to examine the broad ramifications of a weakened US cybersecurity presence. I will take you closer to ground zero by sharing three examples of cyber-enabled activities that are real and imminent threats to you, your organization, or your friends and family.

interisle.substack.com/p/death

Обзор новой редакции NIST 800-61 по реагированию на инциденты

В этой статье я хотел бы рассмотреть вышедший буквально на днях стандарт NIST 800–61r3 «Incident Response Recommendations and Considerations for Cybersecurity Risk Management» (Рекомендации и соображения по реагированию на инциденты для управления рисками в сфере кибербезопасности). Замененный стандарт 800–61r2, выпущенный в далеком 2012 году, был полностью переработан и текущая версия существенно отличается по структуре и подходу к вопросу реагирования на компьютерные инциденты.

habr.com/ru/articles/904252/

ХабрОбзор новой редакции NIST 800-61 по реагированию на инцидентыВ этой статье я хотел бы рассмотреть вышедший буквально на днях стандарт NIST 800–61r3 «Incident Response Recommendations and Considerations for Cybersecurity Risk Management» (Рекомендации...

Daniel J. Bernstein (#djb, to those who know and love him [1]) has a new blog entry about the NIST post-quantum #cryptography standardization process that's been ongoing for some years. Also, follow him @djb .

If you're not aware of some of the controversy about how NIST is running this process, it's a must-read.

blog.cr.yp.to/20250423-mceliec

My $0.02: it sure looks like NIST is backstopping an attempt by the NSA to get everyone to standardize on cryptography #standards that the #NSA knows how to break.

Again.

Yes, they did it before. If you read up on the Dual_EC calamity and its fallout, and how this time it was supposed to be different - open, transparent, secure - then prepare to be disappointed. NIST is playing #Calvinball with their rules for this contest, yanking the rug out from under contenders that appear to be more #secure and better understood, while pushing alternatives that are objectively worse (#weaker encryption, less studied, poorer #performance).

Frankly, I think organizations outside of the #USA would be foolish to trust anything that comes out of #NIST's current work. Well, those inside the USA too, but some of those may be forced by law to use whatever NIST certifies.

[1] Some people think djb is "prickly", not lovable. Oddly, it seems that the only people who say this are those who are wildly incorrect about code/algorithms and are being gently but publicly corrected about by djb at the time

blog.cr.yp.tocr.yp.to: 2025.04.23: McEliece standardization