Codenomicon

Results: 114



#Item
11Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Codenomicon / Software testing / Cert / Information security / AbuseHelper

CERT-FI & Abuse Situation Awareness Case Study BACKGROUND CERT-FI is the Finnish national computer security incident response team whose task is to promote security in the information

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
12Security / Computing / Computer security / Cyberwarfare / Computer network security / Cybercrime / National security / Threat / Information security operations center / Abuse / United States Computer Emergency Readiness Team / New Jersey Cybersecurity and Communications Integration Cell

AbuseSA Build a More Resilient World KEY ABUSESA FEATURES: • Automated Data Collection

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
13Computing / Internet / Network architecture / Internet Standards / Internet protocols / Network protocols / Network booting / Dynamic Host Configuration Protocol / Network service / Universal Plug and Play / Proxy Mobile IPv6 / Transport Layer Security

Defensics_TechSheet_LATEST_25Sept14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
14Computing / Software testing / Computer security / Security / Codenomicon / Vulnerability / Fuzz testing / Wi-Fi / Transport Layer Security / Bluetooth / Vulnerability management

Defensics Build a More Resilient World KEY DEFENSICS FEATURES: • Next-Gen Fuzzing Technology Utilizes template, generation

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
15Computing / Software testing / Security / Computer security / Codenomicon / Computer network security / Heartbleed

Codenomicon_Corporate Backgrounder_2OCT14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
16Software testing / Codenomicon / Computer security / Vulnerability / Software quality / FIPS 140-2 / SAINT

Defensics_FAQ_LATEST_25Sept14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
17Software testing / Codenomicon / Verification and validation / Validation / Computer security / Verification / Robustness testing / Vulnerability

CodeVerify A New Level of Security & Robustness Verification Codenomicon is the industry leader in bringing strength in visibility to connected systems and devices through a next-generation suite of tools and services th

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
18Security / Espionage / Cyberwarfare / Computer network security / Military intelligence / Threat / Computer security / Draft:Threat Intelligence Analyst / Threat Intelligence Platform

AbuseSA Frequently Asked Questions AbuseSA is the cornerstone to an intelligence-driven strategy strategy to help governments and CERTs to rapidly respond to abusive activity. The situational awareness solution provides

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
19Security / Computer security / Software testing / Cyberwarfare / Codenomicon / Computer network security / Cyber-attack

Codenomicon-AppCheck-Symbol-Lock

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
20Computing / Internet / Computer security / Internet security / Transport Layer Security / Software testing / Cryptographic software / Cryptographic protocols / Heartbleed / OpenSSL / Codenomicon / Vulnerability

Heartbleed_story_2014-09-24

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
UPDATE