Cyber Crime

Results: 2199



#Item
21Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / National security / Cyber threat intelligence / Threat / SCADA

Leveraging Threat Intelligence in an Active Defense 2016 Erick Mandt Intelligence Analyst

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:35
22Security / Prevention / Cyberwarfare / Safety / Crime prevention / Cryptography / Information governance / National security / Cyber-security regulation / Computer security / Information security / Security guard

Microsoft Word - FINAL CISO Exempt JOB_2016 06 v1

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2016-06-23 17:40:14
23Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: www.designsafe-ci.org

Language: English - Date: 2016-05-18 14:32:56
24Security / Cyberwarfare / Computing / Cryptography / Computer network security / Computer security / Crime prevention / National security / National Security Agency

The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

Add to Reading List

Source URL: nsclab.org

Language: English - Date: 2016-06-20 22:48:36
25Social engineering / Spamming / Cybercrime / Identity theft / Phishing / Misconduct / Crime / Pawn / Organized crime

Appendix Looking Into a Cyber-Attack Facilitator in the Netherlands Appendix

Add to Reading List

Source URL: documents.trendmicro.com

Language: English - Date: 2016-04-21 22:16:38
26Security / Prevention / Hacking / Military technology / Computer security / Cybercrime / National security / University of Hawaii / Cyberwarfare in the United States / Michigan Cyber Range / DoD Cyber Crime Center

NEWS RELEASE May 23, 2016 Media Contact: Julie Funasaki Yuen, (

Add to Reading List

Source URL: laulima.hawaii.edu

Language: English
27Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Computer security / Atos / International Multilateral Partnership Against Cyber Threats / Information security

EEMA Brief July 2016 Issue 11 EEMA Events EEMA/Vendorcom High Level Fireside Briefing: Should consumers & businesses trust new payment applications? What do cybercriminals really fear? 27 September, 18.00 – 20.30, host

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-07-11 05:29:06
28Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: designsafeci-dev.tacc.utexas.edu

Language: English - Date: 2016-03-01 19:15:58
29Security / Computing / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Capture the flag / Information security / Vulnerability / Computer security

Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise ∗ Joseph Werther, Michael Zhivich, Tim Leek MIT Lincoln Laboratory POC:

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
30Security / Prevention / Safety / Computer security / National security / Crime prevention / Cryptography / Information security / Insurance / Threat / Risk management / Risk

WHITE PAPER Cyber Security Services For Cyber Security, What Determines the Price Tag? Where to Start

Add to Reading List

Source URL: www.tanagerinc.com

Language: English - Date: 2016-06-27 12:47:44
UPDATE