Weakest Link

Results: 40



#Item
11

BATTERSEA – NOT the “weakest link,” thank you very much! An interesting query from one of our guests proffered the perfect opportunity to educate visitors and our valuable clients on the history of Battersea, the

Add to Reading List

Source URL: www.hotelrafayel.com

Language: English - Date: 2013-08-27 07:29:35
    12

    SecurityMetrics HIPAA Security and Privacy Training Your organization is only as secure as its weakest link. Get comprehensive HIPAA security and privacy training for your employees and business associates to help them

    Add to Reading List

    Source URL: www.securitymetrics.com

    Language: English - Date: 2015-07-14 12:51:45
      13Electronic commerce / Computer network security / Cyberwarfare / Payment Card Industry Data Security Standard / Security awareness / SecurityMetrics / Penetration test / Health Insurance Portability and Accountability Act / Threat / Computer security / Security / Data privacy

      SecurityMetrics Data Security Awareness Training Your business is only as secure as its weakest link. Get comprehensive Data Security Awareness Training for your employees to avoid a possible breach. Data Security Aware

      Add to Reading List

      Source URL: www.securitymetrics.com

      Language: English - Date: 2015-07-14 12:51:45
      14

      The Human Factor How attacks exploit people as the weakest link in security A Proofpoint White Paper Most advanced attacks rely as much on exploiting human flaws as they do system flaws. Proofpoint developed this repor

      Add to Reading List

      Source URL: cybersec.orglearn.com

      - Date: 2014-08-06 15:00:16
        15

        New DIVER Geo Scores, Drought Update, Export Challenges April 6, 2015 This week we start with a review of our proprietary DIVER Geo Scores, highlight the strongest and weakest States as well as provide you a link to get

        Add to Reading List

        Source URL: www.lumesis.com

        Language: English - Date: 2015-04-06 11:39:31
          16

          Eliminating the Weakest Link: Making Manipulation Intractable? Jessica Davies, Nina Narodytska, Toby Walsh University of Toronto, NICTA and University of NSW 1

          Add to Reading List

          Source URL: cmss.auckland.ac.nz

          - Date: 2012-04-17 21:22:34
            17Game theory / Network theory / Operations research / Combinatorial optimization / Cooperative game / Core / Shortest path problem / Maximum flow problem / Graph / Mathematics / Graph theory / Theoretical computer science

            Cooperative Weakest Link Games Yoram Bachrach Omer Lev Microsoft Research, Cambridge, UK

            Add to Reading List

            Source URL: www.ifaamas.org

            Language: English - Date: 2014-04-03 06:14:42
            18Transport / Safety / Water transport / Classification society / Naval architecture

            The Invisible Underwriter The weakest link in the Maritime Safety Chain? Robert D. Somerville President, ABS IUMI 2002 Ocean Hull Open Forum

            Add to Reading List

            Source URL: www.iumi.com

            Language: English - Date: 2013-02-23 12:40:45
            19Cyberwarfare / Computer network security / Data security / National security / Vulnerability / Physical security / Social engineering / Information security / Asset / Security / Computer security / Public safety

            2013 IEEE International Conference on Cloud Computing Technology and Science Defining “The Weakest Link”: Comparative Security in Complex Systems of Systems Wolter Pieters TU Delft and University of Twente

            Add to Reading List

            Source URL: eprints.eemcs.utwente.nl

            Language: English - Date: 2014-04-03 05:54:29
            20Password / Phishing / Hacker / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Cybercrime / Computer crimes / Computer security

            cybersecurity.t halesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the weakest link in

            Add to Reading List

            Source URL: cybersecurity.thalesgroup.com.au

            Language: English - Date: 2014-07-20 23:46:33
            UPDATE