National Cyber Security Policy

Results: 150



#Item
11Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:16:48
12Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Add to Reading List

Source URL: aspi.org.au

Language: English - Date: 2014-02-13 22:52:14
13The Protecting Cyber Networks Act   Undermines Privacy, Enables Cyber­Surveillance, and Threatens Internet Security    By Robyn Greene, Policy Counsel    This month, the House of Representative

The Protecting Cyber Networks Act   Undermines Privacy, Enables Cyber­Surveillance, and Threatens Internet Security    By Robyn Greene, Policy Counsel    This month, the House of Representative

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-04-20 18:04:23
14Cybersecurity Information Sharing Act of 2015 Is Cyber­Surveillance, Not Cybersecurity    By Robyn Greene, Policy Counsel    This month, Congress is expected begin consideration of the Cybersec

Cybersecurity Information Sharing Act of 2015 Is Cyber­Surveillance, Not Cybersecurity    By Robyn Greene, Policy Counsel    This month, Congress is expected begin consideration of the Cybersec

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-04-09 17:37:57
15Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:17:00
16Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
17Policy Brief • MayQuarterly Journal: International Security Exaggerating the Chinese Cyber Threat BOTTOM LINES

Policy Brief • MayQuarterly Journal: International Security Exaggerating the Chinese Cyber Threat BOTTOM LINES

Add to Reading List

Source URL: belfercenter.ksg.harvard.edu

Language: English - Date: 2015-05-05 15:45:46
18Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 07:38:51
19Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options; National Research Council

Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options; National Research Council

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2014-10-25 10:17:11
20Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-03-18 10:54:09