Computer insecurity

Results: 197



#Item
61cybersecurity.t halesgroup.com.au  Enabling utility providers to understand if they are at risk of cyberattack and position themselves to handle the added security challenges of merging operational and information techno

cybersecurity.t halesgroup.com.au Enabling utility providers to understand if they are at risk of cyberattack and position themselves to handle the added security challenges of merging operational and information techno

Add to Reading List

Source URL: cybersecurity.thalesgroup.com.au

Language: English - Date: 2014-10-30 20:24:40
62ITS America  The Intelligent Transportation Society of America (ITS America) Connected Vehicle Assessment Cybersecurity and Dependable Transportation

ITS America The Intelligent Transportation Society of America (ITS America) Connected Vehicle Assessment Cybersecurity and Dependable Transportation

Add to Reading List

Source URL: connectedvehicle.itsa.wikispaces.net

Language: English - Date: 2014-04-02 14:54:26
63CTO Corner January 2013 Taking Stock of Cyber in 2012: How have things changed and what should we do about it? Dan Schutzer, CTO, BITS

CTO Corner January 2013 Taking Stock of Cyber in 2012: How have things changed and what should we do about it? Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-01-04 14:02:19
64ENDPOINT SECURITY  WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

ENDPOINT SECURITY WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Add to Reading List

Source URL: containment.comodo.com

Language: English - Date: 2015-02-23 11:56:11
65THE DESERT FALCONS TARGETED ATTACKS Version 2.0 February, 2015 #TheSAS2015 #FalconsAPT

THE DESERT FALCONS TARGETED ATTACKS Version 2.0 February, 2015 #TheSAS2015 #FalconsAPT

Add to Reading List

Source URL: 25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com

Language: English - Date: 2015-02-18 10:35:53
66RESPONSE OF MICROSOFT TO THE EU CONSULTATION ON NETWORK AND INFORMATION SECURITY 15 October 2012 Microsoft1 welcomes the opportunity to respond to the European Commission consultation on network and information security.

RESPONSE OF MICROSOFT TO THE EU CONSULTATION ON NETWORK AND INFORMATION SECURITY 15 October 2012 Microsoft1 welcomes the opportunity to respond to the European Commission consultation on network and information security.

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-01-24 18:09:22
67Accelerate Investigations and Containment  Rapid7 Incident Response Services give you access to the experience and technical expertise to accelerate incident

Accelerate Investigations and Containment Rapid7 Incident Response Services give you access to the experience and technical expertise to accelerate incident

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-02-27 14:25:56
68Executive Summary  Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Executive Summary Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:53
69Executive Summary  Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Executive Summary Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:53
70Executive Summary  Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Executive Summary Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:53