NIST Issues Slew of New Guidance Issues: IT Products Checklist, SCAP Specs, Vulnerability Naming Schemes Guide. NIST also issues Interagency Report 7764: Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition. This report summarizes the evaluation of 14, second-round candidates, and the selection of five SHA 3 finalists that are to advance to the third and final round of the competition. The report also presents recommendations for software and service vendors on how they should use vulnerability names and naming schemes in their product and service offerings.”]
Source: https://www.govinfosecurity.com/nist-issues-slew-new-guidance-a-3386

