Hacking

Results: 3953



#Item
751Security / Hacking / FireEye /  Inc. / Antivirus software / Malware / Vulnerability / Threat / Computer security / Cyberwarfare / Computer network security

Case Study National Grocery Retailer Combats Advanced Threats with FireEye As one of the nation’s largest retailers, this grocery chain supplies hundreds of communities, serving as a local hub

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 18:36:04
752Security / Hacking / FireEye /  Inc. / Antivirus software / Malware / Vulnerability / Threat / Computer security / Cyberwarfare / Computer network security

Case Study National Grocery Retailer Combats Advanced Threats with FireEye As one of the nation’s largest retailers, this grocery chain supplies hundreds of communities, serving as a local hub

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 15:28:10
753Security / Computer security / Hacking / Software testing / Vulnerability / Proprietary software / Open source / Ex parte Endo / Free software / Software licenses / Computer law / Law

December 4, 2014 Mr. Jhonny Pineda contributed to organizing numerous community events in my district office such as grant workshops, community resource fairs, small business export forums, veteran town hall meetings, S

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2015-05-04 13:26:16
754Computer network security / FTP clients / Microsoft Windows / Hacking / Vulnerability / Internet Explorer 6 / Buffer overflow / Internet Explorer / Windows Vista / Computer security / Computing / Cyberwarfare

Software Vulnerability Exploitation Trends Exploring the impact of software mitigations on patterns of vulnerability exploitation Software Vulnerability Exploitation Trends This document is for informational purposes on

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-24 13:36:39
755Cyberwarfare / Software engineering / Vulnerability / Software development process / Science / IT risk management / Software testing / Computer security / Hacking

Sonatype Component Lifecycle Management KEY CAPABILITIES Build an effective secure software development lifecycle and avoid using vulnerable components from the start. CONTINUOUSLY AUTOMATE

Add to Reading List

Source URL: www.sonatype.com

Language: English
756Military science / Cyberwarfare / War / United States Cyber Command / Cyber-security regulation / Military organization / Hacking / Electronic warfare / Military technology

We frequently hear the terms “Cyber 9/11” and “Digital Pearl Harbor,” but we rarely discuss what they actually mean or how to handle the consequences and to manage this kind of crisis situation. The Cyber 9/12 Pr

Add to Reading List

Source URL: www.gcsp.ch

Language: English
757Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 19:39:09
758Computer Fraud and Abuse Act / Computer law / Hacking / Information technology audit / United States Federal Sentencing Guidelines / Mandatory sentencing / CFAA / Presidency of Barack Obama / Criminal law / Sentencing / Law / 98th United States Congress

Nomination of Loretta E. Lynch to be Attorney General of the United States Questions for the Record Submitted February 9, 2015 QUESTIONS FROM SENATOR FRANKEN Question 1. The Computer Fraud and Abuse Act (CFAA) has recei

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-02-17 13:56:24
759Electronic warfare / Hacking / Military technology / FireEye /  Inc. / Advanced persistent threat / International Multilateral Partnership Against Cyber Threats / Cooperative Cyber Defence Centre of Excellence / Canadian government hackings / Cyber-security regulation / Cybercrime / Computer crimes / Cyberwarfare

Government Top Target for APT Attacks With a constant barrage of news about high-profile cyber attacks, 2013 was one of the most interesting years ever in the security arena. Headlines seemed ripped from a Tom Clancy no

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-05-01 06:24:02
760Electronic warfare / Hacking / Military technology / FireEye /  Inc. / Advanced persistent threat / International Multilateral Partnership Against Cyber Threats / Cooperative Cyber Defence Centre of Excellence / Canadian government hackings / Cyber-security regulation / Cybercrime / Computer crimes / Cyberwarfare

Government Top Target for APT Attacks With a constant barrage of news about high-profile cyber attacks, 2013 was one of the most interesting years ever in the security arena. Headlines seemed ripped from a Tom Clancy no

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 06:24:02
UPDATE