Agency security

Results: 25905



#Item
481Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Vulnerability / CERT Coordination Center / SQL injection / Cross-site scripting / CVSS / Zero-day

Reporting Status of Vulnerability-related Information about Software Products and Websites - 2nd Quarter ofApril – June) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Respon

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
482Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / SQL injection / Cross-site scripting / CVSS / Benjamin Kunz Mejri

Reporting Status of Vulnerability-related Information about Software Products and Websites - 4th Quarter ofOctober – December) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
483Cryptography / Security / Cyberwarfare / Clipper chip / Key escrow / Crypto Wars / Computer security / Strong cryptography / National Security Agency / Escrow / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
484

Presented at the National Security Agency’s third High Confidence Software and Systems Conference, Baltimore MD, April 2003 Introducing Cyberlogic? Harald Rueß and Natarajan Shankar Computer Science Laboratory

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2015-04-22 13:40:33
    485Freedom of information in the United States / United States government secrecy / Classified information / Global surveillance / Freedom of Information Act / Sunshine Week / Open Government Partnership / National Security Agency / Open government / Freedom of information laws by country / Global surveillance disclosures / Presidency of Barack Obama

    Steering Committee Steven Aftergood Federation of American Scientists Gary Bass

    Add to Reading List

    Source URL: www.openthegovernment.org

    Language: English - Date: 2014-03-20 13:57:51
    486Cryptography / Email authentication / Cryptographic software / Mass surveillance / Internet privacy / Crypto Wars / Email encryption / Encryption / End-to-end encryption / BitLocker / National Security Agency / Surveillance

    Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

    Add to Reading List

    Source URL: cyber.law.harvard.edu

    Language: English - Date: 2016-01-31 21:23:48
    487Emergency management / Government / Johnson City /  Tennessee / United States Department of Homeland Security / Disaster preparedness / Humanitarian aid / Occupational safety and health / National Response Framework / East Tennessee State University / Federal Emergency Management Agency / Emergency communication system / Emergency notification system

    EMERGENCY MANAGEMENT PLAN July 2015 East Tennessee State University

    Add to Reading List

    Source URL: www.etsu.edu

    Language: English - Date: 2015-08-28 16:26:58
    488Mortgage industry of the United States / Fannie Mae / Federal Housing Finance Agency / Freddie Mac / Mortgage-backed security / Securitization / Mortgage loan / Conservatorship / Federal takeover of Fannie Mae and Freddie Mac / Housing and Economic Recovery Act

    2016 Scorecard for Fannie Mae, Freddie Mac, and Common Securitization Solutions

    Add to Reading List

    Source URL: www.fhfa.gov

    Language: English - Date: 2015-12-17 11:17:19
    489Mass surveillance / National Security Agency / United States government secrecy / Bullrun / RSA Security / Global surveillance disclosures / RSA BSAFE / IPsec / Elliptic curve cryptography / Cryptography / Dual EC DRBG / Crypto Wars

    Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

    Add to Reading List

    Source URL: www.ams.org

    Language: English - Date: 2015-03-10 15:36:10
    490Security / Computing / Cyberinfrastructure / Information Sharing and Analysis Center / National Security Agency / ISAC / Computer security

               

    Add to Reading List

    Source URL: msisac.cisecurity.org

    Language: English - Date: 2015-11-16 13:28:23
    UPDATE