Close Menu
    Latest Post

    Verifying 5G Standalone Activation on Your iPhone

    March 1, 2026

    Hands on: the Galaxy S26 and S26 Plus are more of the same for more money

    March 1, 2026

    IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions

    March 1, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Verifying 5G Standalone Activation on Your iPhone
    • Hands on: the Galaxy S26 and S26 Plus are more of the same for more money
    • IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions
    • Kwasi Asare’s Entrepreneurial Journey: Risk, Reputation, and Resilience
    • The Rubin Observatory’s alert system sent 800,000 pings on its first night
    • GitHub Actions Now Supports Unzipped Artifact Uploads and Downloads
    • Project Genie: Experimenting with Infinite, Interactive Worlds
    • Text Generation Using Diffusion Models and ROI with LLMs
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»NIST Staff Cuts Impact Encryption and Cybersecurity Priorities
    Security

    NIST Staff Cuts Impact Encryption and Cybersecurity Priorities

    Samuel AlejandroBy Samuel AlejandroJanuary 25, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 11nsj9i featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Image 1

    The National Institute for Standards and Technology (NIST) faces 2026 with reduced staffing and a tighter budget, yet retains significant responsibilities in national security and cybersecurity.

    During a recent Information Security Privacy Advisory Board meeting, NIST representatives discussed their efforts to manage various Trump administration directives concerning AI, cybersecurity, and post-quantum encryption.

    Kevin Stine, Director of NIST’s Information Technology Laboratory (ITL), reported that the agency has lost over 700 positions since the previous administration took office, through resignations and voluntary deferments. The ITL, responsible for IT measurements, testing, and standards, currently has 289 employees, having seen a reduction of approximately 89 staff members in the past year.

    Further financial limitations are anticipated, with a recent congressional “minibus” spending package proposing a $13 million cut to NIST’s labs program. Stine noted this figure was “relatively good” compared to other budget proposals he had reviewed.

    Stine indicated that while he was not advocating for increased funding or personnel, the current constraints necessitate a reallocation of resources towards a more focused set of priorities within the office.

    Stine explained that this situation “is forcing a very focused discussion on prioritization of activities.” He added that “certainly critical emerging technologies and anything aligned with the new NIST strategy, as well as administration priorities, are going to be top of the list” and would be adequately resourced.

    NIST’s technical responsibilities, including the testing and validation of encryption for federal government use, are also affected by these staffing reductions.

    A key aspect of ITL’s mission involves collaborating with the Canadian Centre for Cybersecurity to validate the cryptography in commercial IT hardware and software procured by both governments.

    David Hawes, program manager within NIST’s computer security division, described this validation process as “associatingly complex.” He noted that testers must consider numerous implementations and technologies, but fundamentally, the goal is to establish a foundational level of trust between vendors and the federal agencies acquiring their products.

    Hawes articulated the office’s function: “We’ve got a standard, we’ve got testing, we validate it.” He emphasized the core question: “Can…federal government purchasers and users of these products, can they trust the cryptography? That’s what this is all about. Does it meet the standard? Can it be trusted with the information that’s there?”

    Previously, a significant portion of the trust in NIST’s validation process relied on human-led reviews conducted after products were tested in labs. This method “heavily required manpower” to analyze extensive technical documents, certifications, and other unstructured data, often involving non-machine-searchable PDF files. Hawes mentioned that this task was historically handled by junior NIST staff.

    An analysis of NIST’s last 30 cryptographic validations revealed an average completion time of 348 days per project. Despite this, Hawes reported that the agency has successfully decreased its backlog from nearly two years in 2020 to approximately six months currently.

    The long-term objective is to shorten the validation process to mere “days.” While automation and streamlined workflows could contribute to this, Hawes indicated that achieving this goal might be challenging with the current staffing levels.

    Hawes commented that the progress made thus far was “in spite of the loss” of personnel. He added, “We’d be a lot better off in terms of the queue lane now had we not lost the people recently that we did.”

    The federal government is transitioning its IT infrastructure from traditional encryption methods to advanced quantum-resistant algorithms. This shift aims to safeguard federal systems and devices against potential cyberattacks from future quantum computers. Agencies are tasked with identifying and replacing encryption on sensitive assets, with a deadline looming: older encryption applications, such as RSA, are scheduled for formal deprecation by 2030.

    Hawes confirmed that NIST is preparing to assist with this transition, having recently tested its initial post-quantum cryptographic module. He suggested that addressing the existing backlog would be the most efficient way to offer support.

    Hawes stated, “I would say collectively our approach is…getting post-quantum modules validated sooner. So get the queue down, get them in, get them through.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFS Weekly: TikTok’s Journey, AkijBashir’s Cable Market Entry, CRM for EdTech, Partnership Insights, and More
    Next Article The Sony Bravia 8 II is a TV enthusiast’s dream
    Samuel Alejandro

    Related Posts

    Security

    IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions

    March 1, 2026
    Security

    Enterprise Spotlight: Data Center Modernization

    February 28, 2026
    Security

    US Justice Department Seizes $61 Million in Tether from Pig Butchering Crypto Scams

    February 28, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202517 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202515 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 202514 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Verifying 5G Standalone Activation on Your iPhone

    March 1, 20264 Views

    Hands on: the Galaxy S26 and S26 Plus are more of the same for more money

    March 1, 20265 Views

    IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions

    March 1, 20264 Views
    Recent Posts
    • Verifying 5G Standalone Activation on Your iPhone
    • Hands on: the Galaxy S26 and S26 Plus are more of the same for more money
    • IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions
    • Kwasi Asare’s Entrepreneurial Journey: Risk, Reputation, and Resilience
    • The Rubin Observatory’s alert system sent 800,000 pings on its first night
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.