Cyberwarfare

Results: 11990



#Item
531Security / Cyberwarfare / Crime prevention / Cryptography / E-commerce / Credential / Identity management / Knowledge / Computer security

Please complete this form and return it to the Smithsonian Institution Office of Protection Services, Personnel Security and ID Office (PSIO) via fax: (or scan/email to: REQUEST FOR EXCEPTION

Add to Reading List

Source URL: www.ops.si.edu

Language: English - Date: 2013-05-29 12:19:45
532Security / Computing / Computer security / Prevention / Cyberwarfare / Computer network security / Cryptography / National security / Bug bounty program / Vulnerability / Lavasoft / Application security

EVAN RICAFORT Address: Prk. Orchids, Poblacion, Ipil Zamboanga Sibugay, Zamboanga Del Sur 7000 | Email: | Mobile: + | Website: www.evanricafort.com SUMMARY

Add to Reading List

Source URL: evanricafort.com

Language: English - Date: 2016-01-21 13:11:11
533Security / Prevention / Cyberwarfare / Computer security / National security / Computer network security / Crime prevention / Cryptography / Threat / Cyber threat intelligence / Cyber-attack / Information security

The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:52
534Computer security / Computing / Security / Cyberwarfare / Cybercrime / Content-control software / Webroot / International Multilateral Partnership Against Cyber Threats

Are organizations completely ready to stop cyberattacks? A research survey details the security perspective of IT decision makers in the US, UK, and Australia on resourcing,

Add to Reading List

Source URL: www.webroot.com

Language: English - Date: 2016-03-23 12:30:21
535Security / Cyberwarfare / Prevention / Computer security / Cybercrime / National security / United States Department of Homeland Security / Cyber / Cyber-security regulation

AUSTRALIA’S CYBER SECURITY STRATEGY Enabling innovation, growth & prosperity Australia’s Cyber Security Strategy

Add to Reading List

Source URL: cybersecuritystrategy.dpmc.gov.au

Language: English - Date: 2016-05-05 21:19:36
536Malware / Cyberwarfare / Computer access control / Surveillance / Trojan horses / FinFisher / Morgan Marquis-Boire / Citizen Lab / Internet privacy / Bahrain / Server / World Wide Web

Research Brief March 2013 The Citizen Lab You Only Click Twice:

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-06-02 11:36:57
537Computer security / Cyberwarfare / Security / Computing / National Cybersecurity Center of Excellence / United States Department of Homeland Security / Cybercrime / National Cybersecurity Center / Commission on Enhancing National Cybersecurity / National security / Cyber-security regulation / Cybersecurity CS5L CMM

Meeting Minutes for April 14

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-05-20 09:02:05
538National security / Cybercrime / Cyberwarfare / Cyberspace / Information Age / William Gibson / Computer security / National Strategy to Secure Cyberspace / Cyberwarfare in the United States

National Security College National Security College Professional Development Course Cyber Challenges for the National Security Community

Add to Reading List

Source URL: nsc.anu.edu.au

Language: English - Date: 2016-05-31 04:44:03
539Computer security / Cyberwarfare / Computer network security / Computing / Software testing / Metasploit Project / Penetration test / Exploit / Transaction authentication number / Cloud computing

POTASSIUM: Penetration Testing as a Service Richard Li, Dallin Abendroth, Xing Lin, Yuankai Guo, Hyun-wook Baek, Eric Eide, Robert Ricci, and Jacobus Van der Merwe Current Pentesting

Add to Reading List

Source URL: acmsocc.github.io

Language: English - Date: 2016-02-21 03:10:51
UPDATE