The Weakest Link

Results: 32



#Item
11

BATTERSEA – NOT the “weakest link,” thank you very much! An interesting query from one of our guests proffered the perfect opportunity to educate visitors and our valuable clients on the history of Battersea, the

Add to Reading List

Source URL: www.hotelrafayel.com

Language: English - Date: 2013-08-27 07:29:35
    12

    The Human Factor How attacks exploit people as the weakest link in security A Proofpoint White Paper Most advanced attacks rely as much on exploiting human flaws as they do system flaws. Proofpoint developed this repor

    Add to Reading List

    Source URL: cybersec.orglearn.com

    - Date: 2014-08-06 15:00:16
      13

      New DIVER Geo Scores, Drought Update, Export Challenges April 6, 2015 This week we start with a review of our proprietary DIVER Geo Scores, highlight the strongest and weakest States as well as provide you a link to get

      Add to Reading List

      Source URL: www.lumesis.com

      Language: English - Date: 2015-04-06 11:39:31
        14

        Eliminating the Weakest Link: Making Manipulation Intractable? Jessica Davies, Nina Narodytska, Toby Walsh University of Toronto, NICTA and University of NSW 1

        Add to Reading List

        Source URL: cmss.auckland.ac.nz

        - Date: 2012-04-17 21:22:34
          15Transport / Safety / Water transport / Classification society / Naval architecture

          The Invisible Underwriter The weakest link in the Maritime Safety Chain? Robert D. Somerville President, ABS IUMI 2002 Ocean Hull Open Forum

          Add to Reading List

          Source URL: www.iumi.com

          Language: English - Date: 2013-02-23 12:40:45
          16Cyberwarfare / Computer network security / Data security / National security / Vulnerability / Physical security / Social engineering / Information security / Asset / Security / Computer security / Public safety

          2013 IEEE International Conference on Cloud Computing Technology and Science Defining “The Weakest Link”: Comparative Security in Complex Systems of Systems Wolter Pieters TU Delft and University of Twente

          Add to Reading List

          Source URL: eprints.eemcs.utwente.nl

          Language: English - Date: 2014-04-03 05:54:29
          17Password / Phishing / Hacker / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Cybercrime / Computer crimes / Computer security

          cybersecurity.t halesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the weakest link in

          Add to Reading List

          Source URL: cybersecurity.thalesgroup.com.au

          Language: English - Date: 2014-07-20 23:46:33
          18Computing / Malware / Rapid7 / Password / Email / Computer virus / Software / System software / Antivirus software

          You’re Only as Strong as Your Weakest Link: Securing the Endpoint Endpoint Risk According to the 2013 Verizon Data Breach Investigations Report, 71% of attacks and breaches in 2012 involved compromised end-user devices

          Add to Reading List

          Source URL: www.rapid7.com

          Language: English - Date: 2013-08-28 09:00:48
          19DigiNotar / Extended Validation Certificate / Certificate authority / GlobalSign / X.509 / CA/Browser Forum / Public key certificate / HTTP Secure / Root certificate / Cryptography / Public-key cryptography / Key management

          The weakest link in the chain: Vulnerabilities in the SSL certificate authority system and what should be done about them An Access Policy Brief Regarding the Consequences of the DigiNotar breach

          Add to Reading List

          Source URL: s3.amazonaws.com

          Language: English - Date: 2011-11-21 16:23:25
          20Backup / Data security / Electromagnetism / SAS / D2D / RAID / Statistics / Tape drive / Disk staging / Fault-tolerant computer systems / Computing / Computer storage

          bruAPP™ Backup and Recovery Appliance from TOLIS Group A Complete Backup and Restore Solution for Platform-Independent and Ultra-Reliable Data Protection Any solution is only as good as its weakest link. The bruAPP Bac

          Add to Reading List

          Source URL: www.tolisgroup.com

          Language: English - Date: 2015-03-17 15:06:31
          UPDATE