• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

NCCoE Releases Cybersecurity Guide for First Responders

You are here: Home / General Cyber Security News / NCCoE Releases Cybersecurity Guide for First Responders
September 8, 2021

The Countrywide Cybersecurity Center of Excellence (NCCoE) at the Nationwide Institute of Benchmarks and Technology (NIST) has released the final version of a Cybersecurity Practice Guide for first responders. 

The NIST Cybersecurity Apply Manual SP 1800-13, Cellular Software Solitary Sign-On: Bettering Authentication for General public Protection First Responders (PSFRs) was formulated in collaboration with sector stakeholders and NIST’s Community Protection Communications Study Lab. 

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


To supply unexpected emergency care and assist, PSFR personnel rely on mobile platforms to entry public protection information. Amid the information that PSFRs need to obtain in the performance of their roles is individually identifiable details, regulation enforcement delicate data, and shielded overall health facts. 

The new Cybersecurity Observe Guideline was made with the intention of resolving authentication issues so that delicate info can be accessed by PSFRs equally securely and promptly sufficient to protect against any hold off in the provision of probably existence-conserving care. 

Community basic safety organizations can use the guideline to outline needs for cellular application one sign-on (SSO) and multi-factor authentication (MFA) implementation and improve interoperability among the cellular platforms, applications, and id suppliers (IdPs).

Incorporated in the manual is advice on how to increase the performance of PSFRs by chopping down on the amount of authentication techniques, the time it can take to obtain critical information, and the amount of credentials that must be managed.

“This practice manual describes a reference layout for multi-factor authentication and mobile solitary indicator-on for native and web apps while enhancing interoperability amongst cell platforms, applications, and identification companies, no matter of the application development system used in their construction,” mentioned the NCCoE.

The solutions described in the NIST Cybersecurity Apply Guidebook are expectations-based mostly commercially offered or open up-supply goods. 

In the guide, PSFRs are urged to be informed of the probable pitfalls associated with working with mobile platforms and apps. 

The guideline warns buyers that “complex passwords are harder to remember and enter to IT systems” and that “mobile equipment exacerbate this issue with tiny touchscreens that could not perform with gloves or other PSFR machines, and with 3 independent keyboards among which the user have to switch.”


Some sections of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «hackers use open source tools to steal usernames and passwords Hackers use open source tools to steal usernames and passwords
Next Post: TeamTNT’s New Tools Target Multiple OS teamtnt’s new tools target multiple os»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.