Cyberwarfare

Results: 11990



#Item
401Computer forensics / FireEye / Cyberwarfare / Computer network security / Data security / Secure communication / Security information and event management / Computer security / Cloud computing / Network tap

THREAT ANALYTICS PLATFORM: CLOUD COLLECTOR EVENT GENERATOR THAT SECURELY CREATES AND STREAMS EVENT DATA TO THE FIREEYE THREAT ANALYTICS PLATFORM (TAP) OV E R V I E W

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2016-06-24 18:23:18
402Cyberwarfare / Quality assurance / Software assurance / Software quality / National Security Agency / Computer security

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-10-23 17:18:12
403Infrastructure / United States Department of Homeland Security / National security / Cyberwarfare / SoftQuad Software / XMetaL / Critical infrastructure protection / Critical infrastructure / Computer security

C:rsCKS~1DatamingtQuadtaL8CCAUL~1.XML

Add to Reading List

Source URL: docs.house.gov

Language: English
404Computer security / Cybercrime / Cyberwarfare / National security / Computer network security / Commission on Enhancing National Cybersecurity / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / National Cybersecurity Center of Excellence

Commission on Enhancing National Cybersecurity Meeting Minutes June 21, 2016 Commission on Enhancing National Cybersecurity Established by Executive Order 13718,

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-07-27 11:48:29
405Cyberwarfare / Malware / Rootkits / Cryptography / CrySyS Lab / Duqu / Stuxnet / Flame / Wiper / Computer security / Communications security / Ambient intelligence

Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

Add to Reading List

Source URL: crysys.hu

Language: English - Date: 2016-07-26 04:36:44
406Computing platforms / Arxan Technologies / Cyberwarfare / Computer network security / .NET Framework / Malware / Computer security / Proprietary software / Cross-platform / Obfuscation / Software / Windows XP

Protecting .NET Software Applications Arxan Best Practices White Paper Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft. 1

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:55:30
407Cyberwarfare / Actuarial science / Computer security / Management / Computer network security / Open Trusted Technology Provider Standard / Huawei / Supply chain / Risk management / NIST Cybersecurity Framework / Threat / Risk

The Global Cyber Security Challenge It is time for real progress in addressing supply chain risks Andy Purdy USA Cyber Security Officer Huawei Technologies

Add to Reading List

Source URL: www-file.huawei.com

Language: English - Date: 2016-06-17 02:52:23
408Cyberwarfare / E-commerce / Cybercrime / National security / Information Security Group / Royal Holloway /  University of London / Cyber security standards / Computer security

Microsoft Word - Cyber Security - Agenda V36.doc

Add to Reading List

Source URL: www.westminsterforumprojects.co.uk

Language: English - Date: 2014-10-21 11:57:10
409Spamming / Computer network security / Multi-agent systems / Cyberwarfare / Cybercrime / Bitcoin / Phishing / Computer security / ZeroAccess botnet / Botnet / IID / Command and control

MARKET INTELLIGENCE eCrime Trends Report: Fourth QuarterBroadway

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-03-19 14:38:36
410Cyberwarfare / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Sandvine / Denial-of-service attack / Computer security / Traffic classification

Protect your subscribers, services, and network from online threats Cyber Security

Add to Reading List

Source URL: www.sandvine.com

Language: English
UPDATE