Aug 1, 2016 National Institute of Standards and Technology, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, August 2016
Aug 1, 2016 National Institute of Standards and Technology, SHA-3 Derived Functions: cSHAKE, KMAC, TupleHas and ParallelHash, August 2016
Aug 1, 2016 National Institute of Standards and Technology, Report on Lightweight Cryptography, August 2016
Aug 1, 2016 National Institute of Standards and Technology, De-Identifying Government Datasets, August 2016
Aug 1, 2016 National Institute of Standards and Technology, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, August 2016
Aug 1, 2016 National Institute of Standards and Technology, SHA-3 Derived Functions: cSHAKE, KMAC, TupleHas and ParallelHash, August 2016
Aug 1, 2016 National Institute of Standards and Technology, Report on Lightweight Cryptography, August 2016
Aug 1, 2016 National Institute of Standards and Technology, De-Identifying Government Datasets, August 2016
Aug 1, 2016 Office of the Inspector General, Department of the Interior, Report No.: 2016-ITA-032, Inspection of Federal Computer Security at the U.S. Department of the Interior, August 2016. Unclassified. Source Department of the Interior.
Aug 1, 2016 Office of the Inspector General, Department of Health and Human Services, Public Summary Report: The Department of Health and Human Services Security Management Practices for Computer Systems with Access to Personally Identifiable Information, August 2016. Unclassified. Source Department of Health and Human Services.
Aug 1, 2016 Government Accountability Office, GAO-16-771, Electronic Health Information: HHS Needs to Strengthen Security and Privacy Guidance and Oversight, August 2016. Unclassified. Source Government Accountability Office.
Aug 1, 2016 Government Accountability Office, GAO-16-513, Information Security: FDA Needs to Rectify Control Weaknesses That Place Industry and Public Health Data at Risk, August 2016. Unclassified. Source Government Accountability Office.
Aug 1, 2016 Idaho National Laboratory, Cyber Threat and Vulnerability of the U.S. Electric Sector, August 2016. Unclassified. Source Public Intelligence.
Jul 29, 2016 Federal Bureau of Investigations, Smartphone-based Audio Recorder Draft Technical Requirements, July 29, 2016
Jul 29, 2016 United States District Court for the Northern District of Texas Dallas Division, United States of America v. Kamyar Jahanrakhshan, also known as Kamyar Jahan Rakhshan; Andy or Andrew Rakhshan; Andy or Andrew Kamyar (or Kamiar or Kamier) Rakhshan: Criminal Complaint, July 29, 2016. Unclassified.
Jul 28, 2016 Drew Springall, Zakir Durumeric, and J. Alex Halderman, University of Michigan, FTP: The Forgotten Cloud, July 28, 2016. Not classified. Source Drew Springall.
Jul 27, 2016 Department of Justice, James Comey (FBI) Speech at Fordham University International Cyber Security Conference, Humily, Adaptability, and Collaboration: The Way Forward in Cyber Security, July 27, 2016
Jul 26, 2016 The White House, "Fact Sheet: Presidential Policy Directive on United States Cyber Incident Coordination," July 26, 2016. Unclassified. Source The White House.
Jul 26, 2016 The White House, "Annex for Presidential Policy Directive - United States Cyber Incident Coordination," July 26, 2016. Unclassified. Source The White House.
Jul 26, 2016 The White House, PPD-41, "Presidential Policy Directive - United States Cyber Incident Coordination," July 26, 2016. Unclassified. Source The White House.