Security information management

Results: 13712



#Item
131Computing / Information technology / Data management / Data / Business intelligence / Big data / Computer security / Formal sciences / Threat / Analytics / Data warehouse

Solutions Threat Intelligence Vanquish Digital Threats: Internal

Add to Reading List

Source URL: www.koverse.com

Language: English - Date: 2015-09-29 12:19:29
132Computer security / Information security operations center / Network management / Surveillance / Quantitative analyst / System on a chip / Business process modeling / Computing / Science and technology / Technology

A Human Capital Model for Mitigating Security Analyst Burnout Sathya Chandran Sundaramurthy Kansas State University

Add to Reading List

Source URL: www.usenix.org

Language: English
133Software / Computing / Free software / Internet Standards / File Transfer Protocol / FileZilla / FTPS / Expect / Comparison of FTP client software

Information on the state of FTP and available alternatives: Why You Should Replace Your Self-Hosted FTP Server Information on FTP security, management, access, scalability, and available alternatives.

Add to Reading List

Source URL: www.smartfile.com

Language: English - Date: 2015-06-19 12:10:30
134Security / Computer network security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Information technology controls / SarbanesOxley Act / Internal control / Computer security / Regulatory compliance

SECURITY COMPLIANCE MANAGEMENT COMPLY WITH SARBANES-OXLEY IT SECURITY CONTROLS The Challenge Section 404 of the Sarbanes-Oxley Act (SOX) requires that chief executives attest to the

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
135Identity management / Law / Privacy / Cryptography / Computer security / Digital media

Sensitive Information in a Wired World Supported by the National Science Foundation under the ITR Program JOAN FEIGENBAUM

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2003-12-06 08:26:04
136Cyberwarfare / Computer security / Security / Computing / International Multilateral Partnership Against Cyber Threats / Federal Information Security Management Act / National Cybersecurity Center of Excellence / Cyber-security regulation

Texas Commission Panelist and Speaker Statements

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-07-15 13:37:24
137Computer access control / Security / Prevention / Obfuscation / Password / Identity management / Cryptography / Password manager

Pico Gyazo Study – Information Sheet Who we are Pico is an ERC-funded project (grant StGbeing conducted at the University of Cambridge (UK). The Principal Investigator is Dr Frank Stajano. This study is being

Add to Reading List

Source URL: study.mypico.org

Language: English - Date: 2016-07-29 12:41:42
138Software / Computing / System software / Proxy servers / Internet privacy / Reverse proxy / Computer networking / Network performance / Microsoft Forefront Threat Management Gateway / Squid / Internet Information Services / Windows NT 4.0

Technical Research Paper Performance tests with the Microsoft Internet Security and Acceleration (ISA) Server Author:

Add to Reading List

Source URL: www.webperformance.com

Language: English - Date: 2005-12-20 21:05:41
139Privacy / Internet privacy / Identity management / Computing / Personally identifiable information / Computer security / Government / HTTP cookie / Medical privacy / In re Gateway Learning Corp. / FTC regulation of behavioral advertising

Realeflow Privacy Policy – May 20, 2014 Realeflow, LLC (“Realeflow”) has created this Privacy Policy to demonstrate our commitment to privacy and security. This Privacy Policy describes our policies and procedures

Add to Reading List

Source URL: realeflow.com

Language: English - Date: 2015-10-06 16:57:07
140Fisheries law / Fishing / Fisheries science / Natural environment / Fishing industry / Natural resources / Personally identifiable information / Privacy / Endangered Species Act / Privacy Office of the U.S. Department of Homeland Security / MagnusonStevens Fishery Conservation and Management Act / National Marine Fisheries Service

Version Number: U.S. Department of Commerce NOAA NMFS Privacy Impact Assessment

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2016-07-26 15:07:51
UPDATE