Cyberwarfare

Results: 11990



#Item
161Malware / Computer security / Cyberwarfare / Antivirus software / Malwarebytes Anti-Malware / Computer virus / Ransomware / Zero-day / Rootkit

C A S E S T U DY Agnico Eagle Mines Ltd. strikes gold with Malwarebytes Malwarebytes proactively blocks exploits from entering and digging in Business profile

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-21 17:36:12
162Prevention / Security / Safety / Computer security / National security / Cyberwarfare / Cybercrime / Insider threat / Espionage / Outline of computer security / Cyberwarfare in the United States

THE FACTS: INSIDER THREATS Organizations can often mitigate the threat of outsiders stealing their property, either physically or electronically. But the insider -- the employee with legitimate access – can be much har

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
163Security / Computer security / Information technology management / Data security / System administration / Splunk / Computer network security / Cyberwarfare / Cryptography

SECURITY PROFESSIONAL SERVICES Security Program Review Services Improve Your Security Posture Overview

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-01-08 01:13:16
164Computer security / Security / Cyberwarfare / Computing / Federally Funded Research and Development Centers / National Cybersecurity Center of Excellence / Mitre Corporation / International Multilateral Partnership Against Cyber Threats / National security / Michigan Cyber Range / National Cybersecurity FFRDC

2015 ELECTRICAL AND COMPUTER ENGINEERING CURRENTS www.ece.udel.edu

Add to Reading List

Source URL: www.ee.udel.edu

Language: English - Date: 2015-11-02 16:42:25
165Computer security / Software / Cyberwarfare / Mobile Malware / Smartphones / Mobile security / Malware / Android / Computer virus / Google Play / DroidKungFu / Antivirus software

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets Yajin Zhou Zhi Wang Wu Zhou Xuxian Jiang Department of Computer Science North Carolina State University {yajin zhou,zhi

Add to Reading List

Source URL: yajin.org

Language: English
166Technology / Computing / Security / Industrial Internet Consortium / Cyberwarfare / IIC / Internet / Interoperability / Enterprise architecture framework / Computer security

Engineering: The First Steps PURPOSE AND AUDIENCE This document provides an overview of the scope, mission, and status of the engineering work of the Industrial Internet Consortium (IIC). There are four audiences for thi

Add to Reading List

Source URL: www.iiconsortium.org

Language: English - Date: 2016-07-25 11:57:01
167Security / Computer network security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Information technology controls / SarbanesOxley Act / Internal control / Computer security / Regulatory compliance

SECURITY COMPLIANCE MANAGEMENT COMPLY WITH SARBANES-OXLEY IT SECURITY CONTROLS The Challenge Section 404 of the Sarbanes-Oxley Act (SOX) requires that chief executives attest to the

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
168Malware / Cyberwarfare / Computer security / Trojan horses / Cybercrime / Computer network security / Social engineering / Zeus / Man-in-the-browser / International cybercrime / Identity theft / Transaction authentication number

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-05-28 11:33:54
169United States Department of Homeland Security / Government / Security / Prevention / National security / Infrastructure / Cyberwarfare / Security engineering / Critical infrastructure protection / National Infrastructure Protection Plan / Critical infrastructure / Resilience

February 29, 2016 Volume 2, Issue 4 The Partnership Quarterly includes critical infrastructure security and resilience articles, highlights crosssector initiatives, and identifies training and exercise opportunities, ne

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2016-03-02 12:49:07
170Cyberwarfare / Computer security / Security / Computing / International Multilateral Partnership Against Cyber Threats / Federal Information Security Management Act / National Cybersecurity Center of Excellence / Cyber-security regulation

Texas Commission Panelist and Speaker Statements

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-07-15 13:37:24
UPDATE