NIST White Papers

(View All Report Types)
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Implementing the NIST Cybersecurity Framework
sponsored by Hughes Network Systems
BLOG: The NIST Cybersecurity Framework helps organizations manage cyber risk. Hughes aligns its solutions to the framework's core functions. Learn how Hughes can help your business implement the NIST framework to protect your network and data.
Posted: 03 Dec 2024 | Published: 09 Aug 2024

Hughes Network Systems

Cybersecurity standards in action: NIST and Nokia's guide for telcos
sponsored by NOKIA Intel
WEBCAST: In today's ever-evolving cybersecurity landscape, standards and regulations are necessary to keep everything from falling apart. But what exactly do these standards do, especially in the communication service industry? Tune into this webinar to learn more.
Posted: 23 Nov 2024 | Premiered: Oct 3, 2024

NOKIA Intel

Empowering Your Cyber Defense: Key Insights into the Latest NIST CSF Update
sponsored by OneTrust
WEBCAST: In this webcast, you’ll gain key insights into the latest NIST CSF updates and find out how you can leverage the framework to bolster cybersecurity for your organization. Tune in now to unlock best practices for elevating your cyber defense.
Posted: 18 Sep 2024 | Premiered: Sep 18, 2024

TOPICS:  .NET
OneTrust

Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
sponsored by XtelligentMedia Healthcare
EGUIDE: The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
Posted: 23 Jul 2024 | Published: 23 Jul 2024

XtelligentMedia Healthcare

AppSec Solution Guide for Complying with New NIST SP 800-53 IAST and RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The new NIST Cybersecurity Framework now requires interactive application security testing (IAST) and runtime application self-protection (RASP) to improve DevSecOps efficiency and reduce security risks. Learn how these technologies can help your organization comply with the latest NIST guidelines in this detailed white paper.
Posted: 11 Sep 2024 | Published: 11 Sep 2024

Contrast Security

AppSec Solution Guide for Complying with New NIST SP 800-53 IAST and RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The new NIST Cybersecurity Framework now requires interactive application security testing (IAST) and runtime application self-protection (RASP) to improve DevSecOps efficiency and reduce security risks. Learn how these technologies can help your organization comply with the latest NIST guidelines in this detailed white paper.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Application Detection and Response (ADR): Helping SecOps teams address NIST CSF
sponsored by Contrast Security
INFOGRAPHIC: This infographic explores how Application Detection and Response (ADR) can help security operations centers (SOCs) address the NIST Cybersecurity Framework, extending visibility into the application and API layer to identify and mitigate threats. Read the full infographic to learn more.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

Contrast Security

How MSPs can Implement Compliance Mandated Access Management Controls
sponsored by CyberQP
WHITE PAPER: Explore how MSPs can secure admin accounts and customer identities to meet NIST and CMMC compliance requirements. Learn about privileged access management, password updates, and other best practices to protect your environment. Read the full white paper for more insights.
Posted: 03 Jan 2025 | Published: 04 Jan 2025

CyberQP

Secure Software Development Environments
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure software development environments are critical to prevent supply chain attacks. This solution brief outlines how Zentera's CoIP Platform can help organizations achieve NIST SP800-218 compliance while maintaining developer productivity through a zero trust architecture. Read the full solution brief to learn more.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Endace Video 12
sponsored by Endace
WEBCAST: In his conversation with Endace’s Michael Morris, NIST Fellow Ron Ross shares his thoughts on how cybersecurity standards are evolving with modern threat challenges. Watch now to access his insights.
Posted: 21 Mar 2023 | Premiered: Mar 21, 2023

TOPICS:  .NET
Endace

Preparing for the Quantum Era in Networking with Post-Quantum Cryptography
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Quantum computing threatens cryptographic systems by potentially breaking encryption for data-in-transit and digital signatures. Post-quantum cryptography, including NIST algorithms like CRYSTALS-KYBER, offers protection against these threats. Read this white paper to learn how to implement quantum-resistant solutions.
Posted: 18 Mar 2025 | Published: 18 Mar 2025

Riverbed Technology, Inc.

CoIP® Platform Zero Trust Architecture
sponsored by Zentera Systems Inc.
WHITE PAPER: This white paper details how Zentera's CoIP Platform implements a NIST SP 800-207 Zero Trust Architecture. It discusses Virtual Chambers, access policies, and deployment models. Discover how CoIP can secure assets and modernize your security without major infrastructure changes. Read the full white paper.
Posted: 20 Mar 2025 | Published: 14 Feb 2025

Zentera Systems Inc.

Achieve Quantum Resistance with Utimaco
sponsored by Utimaco
PRODUCT OVERVIEW: Utimaco's u.trust General Purpose HSM Se-Series offers quantum-resistant cryptography to secure your infrastructure. Upgrade with Quantum Protect firmware that includes NIST-recommended post-quantum algorithms. Evaluate performance with the free PQC simulator. Read the full product overview to prepare for the quantum future.
Posted: 21 Jun 2024 | Published: 21 Jun 2024

Utimaco

Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER: As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024

Verizon

Build a Solid Foundation for Password Protection
sponsored by SpecOps and Outpost24
VIDEO: Specops Password Auditor is a tool that scans Active Directory for password vulnerabilities, including leaked passwords and policy weaknesses. It provides detailed reports on user accounts, password policies, and compliance. Improve your organization's password security by identifying risks. Watch the video to start auditing today.
Posted: 14 Mar 2025 | Premiered: 14 Mar 2025

SpecOps and Outpost24

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 09 Jul 2024 | Published: 09 Jul 2024

Contrast Security

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Future-Proof Your Security: Quantum Computing and PQC with Utimaco
sponsored by Utimaco
ANALYST REPORT: Frost & Sullivan names Utimaco a Competitive Strategy Leader in post-quantum cryptography. Utimaco's expertise in deploying hardware security modules positions it as a key partner for organizations migrating to quantum-resistant algorithms. Read the full analyst report to learn more.
Posted: 16 Dec 2024 | Published: 17 Dec 2024

Utimaco

Combating Cyber Attacks
sponsored by SpecOps and Outpost24
VIDEO: Specops Password Policy boosts Active Directory security by blocking over 4 billion compromised passwords. It simplifies compliance and reduces help desk tickets with user-friendly password guidance. Administrators can use GPOs to create detailed password policies, enhancing security. Discover how this tool reduces your attack surface.
Posted: 18 Mar 2025 | Premiered: 18 Mar 2025

SpecOps and Outpost24

Proactive Threat Hunting & Automated Incident Response: Strengthening Federal Cyber Resilience
sponsored by Merlin International
PRODUCT OVERVIEW: Federal agencies face relentless cyber threats that outpace traditional security. Manual processes cause alert fatigue and slow responses. Using automated solutions like Palo Alto XSOAR and Qualys VMDR, agencies achieve proactive cybersecurity with centralized alerting and rapid remediation. Discover how to implement security automation here.
Posted: 21 Mar 2025 | Published: 22 Mar 2025

Merlin International

Boost Data Resilience
sponsored by Panzura
PRODUCT OVERVIEW: Cyberstorage combines security and storage to enhance data resilience against ransomware and threats. Panzura CloudFS provides immutable storage, rapid recovery, and early detection to reduce damage from cyber events. Learn to protect critical data and ensure business continuity by reading this detailed overview on data resilience strategies.
Posted: 06 Mar 2025 | Published: 06 Mar 2025

Panzura

Accelerating the transformation from paper to digital
sponsored by Iron Mountain
IT BRIEFING: As the workplace becomes more digital, organizations need efficient ways to access and manage their information. Learn how the Iron Mountain InSight Digital Experience Platform can help you digitize, secure, and collaborate on documents to prepare for the future. Read the full white paper to discover the business benefits.
Posted: 13 Feb 2025 | Published: 13 Feb 2025

Iron Mountain

Exabeam Support for the NYDFS Cybersecurity Regulation (23 NYCRR 500)
sponsored by Exabeam
PRODUCT OVERVIEW: The NYDFS Cybersecurity Regulation requires financial institutions to protect information systems and non-public data. This document explains how Exabeam's platform supports compliance through monitoring, threat detection, and reporting. Read the full Product Overview to see how Exabeam enhances your cybersecurity program.
Posted: 26 Mar 2025 | Published: 26 Mar 2025

Exabeam

Zero Trust, Simplified Benefits of the CoIP® Platform Overlay
sponsored by Zentera Systems Inc.
WHITE PAPER: Explore the simplified benefits of Zentera's CoIP Platform for implementing a robust Zero Trust architecture. Learn how this software-defined approach can reduce your attack surface, enable rapid compliance, and avoid costly infrastructure changes. Read the white paper to get started.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Secure Contractor and Vendor Access
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: This solution brief explores how Zentera's CoIP Platform can provide secure, VPN-free access for contractors and vendors to enterprise applications, with granular access controls and micro-segmentation based on user identity and roles. Learn how to establish a high-security environment for sensitive content access. Read the full solution brief.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.