NIST and DFARS Compliance 101: What You Need to Know

You only need to tune into the news for a short time to understand that hostile governments are doing everything they can to steal valuable information anywhere they can get it. Of particular risk to our national security are sensitive defense related secrets. However, the Department of Defense has identified that it’s not just information marked by some form of ‘classification’ that can be valuable to a hostile foreign power. There are large amounts of information throughout the defense acquisition system that could be valuable to foreigners if compromised.

Read more

The NIST Cybersecurity Framework Core (Part 1 of 3)

The NIST cybersecurity framework is comprised of three main components:

Read more

The NIST Cybersecurity Framework Profiles: (Part 3 of 3)

The NIST cybersecurity framework is comprised of three main components:

Read more

Everything You’ll Ever Want to Know About NIST

The National Institute of Standards and Technology (NIST) has been advancing science, technology, and public-private adoption of the latest tools and procedures for over a century. Here we’ll explore everything you’ve ever wanted to know about the organization. 

Read more

Producing and Protecting Manufacturing Technology with NIST MEP

Manufacturers are the back bone of our economy.  For three decades the National Institute of Standards and Technology (NIST) and the Manufacturers Extension Partnership (MEP) have been focused on improving competitiveness by creating efficiencies and output for small and medium sized manufacturers in the United States. Since 1988 the NIST MEP program has helped produce close to $100 billion in sales, nearly $16 billion in cost savings, resulting in 800,000 jobs. A noble cause and one of critical importance for our country’s global economic edge and stability.

Read more

Introduction to NIST and the NIST Cybersecurity Framework

In the world of cybersecurity, the only constant is the quickly-changing environment. With this rapid pace, threat vectors change, and so too must the industry best practices that are used to protect against them. Documentation in the world of cybersecurity is often behind and outdated, as trends usually change quicker than documents are able to be drafted.

Read more