Computer insecurity

Results: 197



#Item
161February 12, 2013  Raising the Bar for Cybersecurity James A. Lewis “What was previously classified as an unlikely but very damaging event affecting one or a few institutions should now probably be thought of as a pers

February 12, 2013 Raising the Bar for Cybersecurity James A. Lewis “What was previously classified as an unlikely but very damaging event affecting one or a few institutions should now probably be thought of as a pers

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-02-14 16:58:21
162Counter Stealth Malware Solution Guide

Counter Stealth Malware Solution Guide

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:32
163C-SAWR 19 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as o

C-SAWR 19 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as o

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-06-05 10:20:31
164Cybersecurity: Implications for Global Business A Solutions Perspective PRESENTED BY: Dave Merkel, CTO

Cybersecurity: Implications for Global Business A Solutions Perspective PRESENTED BY: Dave Merkel, CTO

Add to Reading List

Source URL: www.iiea.com

Language: English - Date: 2013-12-05 05:51:26
165Codenomicon The Cost of Zero-Day Attacks in the Financial Sector Date: May 2013 Author: Andrew Kellett

Codenomicon The Cost of Zero-Day Attacks in the Financial Sector Date: May 2013 Author: Andrew Kellett

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2013-06-14 08:06:08
166

PDF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-08-26 23:02:29
167Security News Digest July 22, 2014 Law’s Anti-Malware Provisions Complicate Transactions for Software Developers http://www.newsoptimist.ca/article[removed]BATTLEFORD0101[removed]BATTLEFORD/law-8217-s-antimalware

Security News Digest July 22, 2014 Law’s Anti-Malware Provisions Complicate Transactions for Software Developers http://www.newsoptimist.ca/article[removed]BATTLEFORD0101[removed]BATTLEFORD/law-8217-s-antimalware

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2014-07-23 11:46:58
168February 12, 2013  Raising the Bar for Cybersecurity James A. Lewis “What was previously classified as an unlikely but very damaging event affecting one or a few institutions should now probably be thought of as a pers

February 12, 2013 Raising the Bar for Cybersecurity James A. Lewis “What was previously classified as an unlikely but very damaging event affecting one or a few institutions should now probably be thought of as a pers

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-02-14 16:58:21
169Veracode Input for Developing a Framework to Improve Critical Infrastructure Cybersecurity Background Veracode provides automated and manual application security testing for over 300 organizations in the US and abroad. O

Veracode Input for Developing a Framework to Improve Critical Infrastructure Cybersecurity Background Veracode provides automated and manual application security testing for over 300 organizations in the US and abroad. O

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-08 14:08:49
170Healthcare and Public Health Cybersecurity Primer:  Cybersecurity 101

Healthcare and Public Health Cybersecurity Primer: Cybersecurity 101

Add to Reading List

Source URL: www.phe.gov

Language: English - Date: 2013-11-26 10:35:04