Back to Results
First PageMeta Content
Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security


FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing
Add to Reading List

Document Date: 2014-08-11 22:30:03


Open Document

File Size: 188,16 KB

Share Result on Facebook

City

Browser / /

Company

FireEye Inc. / Federal Information Systems / /

Currency

CVE / /

Event

FDA Phase / Reorganization / /

Facility

SANS Institute / National Institute of Standards / /

IndustryTerm

cyber security solutions / event-management tools / real-time threat assessment / real-time blocking technologies / Internet resources / organizational information systems / real time / information infrastructure systems / kill chain / logged-in scanning tool / market solutions / anti-malware tools / networked computing environment / automated monitoring tools / security systems / attachments/ applications / signature-based products / secure information systems / federal systems / real-time analysis detection / suspicious email communications / malicious communications / invaluable tools / isolation techniques / signature-based solutions / Web content filtering / suspicious applications / compromised computer systems / web-based malicious code / dynamic real-time analysis / infrastructure systems / technology differentiation / social networks / information technology infrastructures / Web gateway / event management / corporate systems / end host systems / attack kill chain / endpoint security tools / /

Organization

NIST SP / SANS Institute / office of Management and Budget / National Institute of Standards and Technologies / Council on CyberSecurity / US Federal Reserve / IT / An / FireEye Dynamic Threat Intelligence / /

Position

user/administrator / engineer / chief information security officers / domain administrator / federal chief information officers / administrator / CIO / comparable official / /

Product

FireEye platform / FireEye / /

Technology

virtual machine / information technology / real-time blocking technologies / operating systems / PDF / mobile devices / Java / Flash / /

SocialTag