Center for Internet Security

Results: 308



#Item
1Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

Add to Reading List

Source URL: nationalsecurity.gmu.edu

Language: English - Date: 2018-05-01 13:10:56
    2Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

    Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

    Add to Reading List

    Source URL: cyber.harvard.edu

    - Date: 2016-01-31 21:23:48
      3Center for Internet Security Configuration Assessment Tool CIS-CAT Users Guide v3.0.27

      Center for Internet Security Configuration Assessment Tool CIS-CAT Users Guide v3.0.27

      Add to Reading List

      Source URL: benchmarks.cisecurity.org

      - Date: 2016-07-18 17:54:03
        4OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM David Solin – jOVAL.org Tigran Gevorgyan, Qualys, Inc.

        OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM David Solin – jOVAL.org Tigran Gevorgyan, Qualys, Inc.

        Add to Reading List

        Source URL: oval.mitre.org

        - Date: 2015-03-27 10:15:23
          5Computer and Network Security Original Implementation: January 24, 1995 Last Revision: November 2, 2015 This policy establishes the conditions and security requirements for the use of computing equipment and networks at

          Computer and Network Security Original Implementation: January 24, 1995 Last Revision: November 2, 2015 This policy establishes the conditions and security requirements for the use of computing equipment and networks at

          Add to Reading List

          Source URL: www.sfasu.edu

          Language: English - Date: 2016-07-26 16:47:37
          6ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

          ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

          Add to Reading List

          Source URL: fm.csl.sri.com

          Language: English - Date: 2011-12-15 18:21:31
          7Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to DEPARTMENT OF HEALTH AND HUMAN SERVICES [Docket ID: HHS-OPHSHuman Subjects Research Protections: Enhancing Protections for Research Subjects and

          Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to DEPARTMENT OF HEALTH AND HUMAN SERVICES [Docket ID: HHS-OPHSHuman Subjects Research Protections: Enhancing Protections for Research Subjects and

          Add to Reading List

          Source URL: epic.org

          Language: English - Date: 2016-02-22 14:56:26
          8This paper appears at the 24th USENIX Security SymposiumInvestigating the Computer Security Practices and Needs of Journalists Susan E. McGregor Tow Center for Digital Journalism Columbia Journalism School

          This paper appears at the 24th USENIX Security SymposiumInvestigating the Computer Security Practices and Needs of Journalists Susan E. McGregor Tow Center for Digital Journalism Columbia Journalism School

          Add to Reading List

          Source URL: www.franziroesner.com

          Language: English - Date: 2015-06-29 14:09:16
          9OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM Randy Taylor – ThreatGuard, Inc. William Munyan – Center for Internet Security

          OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM Randy Taylor – ThreatGuard, Inc. William Munyan – Center for Internet Security

          Add to Reading List

          Source URL: oval.mitre.org

          Language: English - Date: 2015-07-09 13:26:57
          10OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM David Solin – jOVAL.org Scott Armstrong – INADEV Corporation

          OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM David Solin – jOVAL.org Scott Armstrong – INADEV Corporation

          Add to Reading List

          Source URL: oval.mitre.org

          Language: English - Date: 2015-07-09 13:26:34