Cyber threat intelligence

Results: 83



#Item
71Structured Threat Information eXpression — STIX™ A Structured Language for Cyber Threat Intelligence Information STIX is a collaborative, community-driven effort to define and develop a structured language to represe

Structured Threat Information eXpression — STIX™ A Structured Language for Cyber Threat Intelligence Information STIX is a collaborative, community-driven effort to define and develop a structured language to represe

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:54
72a preliminary examination of insider threat programs in the U.s. private sector IntellIgence and natIonal SecurIty allIance Cyber CounCil: insider ThreaT Task ForCe sepTember 2013

a preliminary examination of insider threat programs in the U.s. private sector IntellIgence and natIonal SecurIty allIance Cyber CounCil: insider ThreaT Task ForCe sepTember 2013

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-13 10:34:46
73Risk Intelligent governance in the age of cyber threats What you don’t know could hurt you  Risk Intelligence Series

Risk Intelligent governance in the age of cyber threats What you don’t know could hurt you Risk Intelligence Series

Add to Reading List

Source URL: deloitte.wsj.com

Language: English - Date: 2012-07-17 17:11:29
74The Rogers-Ruppersberger Cybersecurity Bill The Cyber Threat: Every day U.S. businesses are targeted by nation-state actors like China, Iran and Russia for cyber exploitation and theft, resulting in huge losses of valuab

The Rogers-Ruppersberger Cybersecurity Bill The Cyber Threat: Every day U.S. businesses are targeted by nation-state actors like China, Iran and Russia for cyber exploitation and theft, resulting in huge losses of valuab

Add to Reading List

Source URL: intelligence.house.gov

Language: English - Date: 2013-02-13 11:10:49
75Cyber Threat Intelligence Coordinating Group (CTICG) “Building a Communication Bridge Between Cyber and Physical Security” Recognizing the Relationship Between Physical and Cyber Security

Cyber Threat Intelligence Coordinating Group (CTICG) “Building a Communication Bridge Between Cyber and Physical Security” Recognizing the Relationship Between Physical and Cyber Security

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-12-15 08:46:44
76Cyber Intelligence Sharing and Protection Act of 2013 Overview: The Rogers-Ruppersberger cyber bill provides strong protections for privacy and civil liberties while still enabling effective cyber threat sharing and prov

Cyber Intelligence Sharing and Protection Act of 2013 Overview: The Rogers-Ruppersberger cyber bill provides strong protections for privacy and civil liberties while still enabling effective cyber threat sharing and prov

Add to Reading List

Source URL: intelligence.house.gov

Language: English - Date: 2013-02-13 11:11:02
7725 June 2013 “Chinese Cyber Espionage” Testimony of James C. Mulvenon, Ph.D. Vice-President, Defense Group, Inc. Intelligence Division Director, Center for Intelligence Research and Analysis

25 June 2013 “Chinese Cyber Espionage” Testimony of James C. Mulvenon, Ph.D. Vice-President, Defense Group, Inc. Intelligence Division Director, Center for Intelligence Research and Analysis

Add to Reading List

Source URL: www.cecc.gov

Language: English - Date: 2013-06-28 16:34:06
78The Rogers-Ruppersberger Cybersecurity Bill (H.R[removed]The Cyber Threat: Every day U.S. businesses are targeted by nation-state actors like China, Iran and Russia for cyber exploitation and theft, resulting in huge losse

The Rogers-Ruppersberger Cybersecurity Bill (H.R[removed]The Cyber Threat: Every day U.S. businesses are targeted by nation-state actors like China, Iran and Russia for cyber exploitation and theft, resulting in huge losse

Add to Reading List

Source URL: intelligence.house.gov

Language: English - Date: 2013-04-17 11:52:25
79BAG14663  S.L.C. Calendar No. ll

BAG14663 S.L.C. Calendar No. ll

Add to Reading List

Source URL: www.intelligence.senate.gov

Language: English - Date: 2014-07-10 13:54:43
80Cyber intelligence services The current epidemic of cyber attacks has seen a long list of victims including many of the world’s largest organisations. They have all been targeted by crafted precision attacks enabled by

Cyber intelligence services The current epidemic of cyber attacks has seen a long list of victims including many of the world’s largest organisations. They have all been targeted by crafted precision attacks enabled by

Add to Reading List

Source URL: www.digitalshadows.com

Language: English - Date: 2014-07-04 11:06:09