Computer Security Institute

Results: 1676



#Item
251Computer security / NIST Special Publication 800-53 / National Institute of Standards and Technology / International Multilateral Partnership Against Cyber Threats / Security Assertion Markup Language / OASIS / Security / Computing / Computer crimes

MQTT and the NIST Cybersecurity Framework Version 1.0 Committee NoteMay 2014 Specification URIs This version:

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-05-28 12:00:00
252National security / Public safety / Data security / International Multilateral Partnership Against Cyber Threats / Information security / National Institute of Standards and Technology / Cyber security standards / National Cyber Security Division / Security / Computer security / Crime prevention

Cybersecurity Framework National Restaurant Association Webinar - February 19, 2015 Presentation

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2015-03-05 19:24:37
253FireEye /  Inc. / Internet / Malware / Antivirus software / Computer virus / Japan Advanced Institute of Science and Technology / Email / Firewall / World Wide Web / Computing / Computer network security / Computer security

CUSTOMER STORY FireEye NX Early Detection of Malicious Callback Communication Protects JAIST Without Hindering Research

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-04-30 19:34:41
254Information technology audit / Computer security / Accountancy / Computing / Certified Information Security Manager / Information Systems Audit and Control Association / Certified Information Systems Auditor / CISA / Hong Kong Institute of Certified Public Accountants / Data security / Auditing / Professional accountancy bodies

2009 (1st) CISA / CISM Information Seminar The ISACA (Information Systems Audit and Control Association) Hong Kong Chapter is pleased to announce the following information seminar:

Add to Reading List

Source URL: www.isaca.org.hk

Language: English - Date: 2009-01-09 07:59:36
255Ethics / Engineering / IEEE Computer Society / Institute of Electrical and Electronics Engineers / Privacy / Ambient intelligence / Measurement / International nongovernmental organizations / Professional associations / Standards organizations

tcsp-oakland11-report.dvi

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2011-05-16 17:23:45
256Federal Information Security Management Act / Continuous monitoring / Security / Information technology management / Computing / Computer security / Data security / Computer law

An Enterprise Continuous Monitoring Technical Reference ArchitecturePresenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
257Smartphone / Computer security / Cloud computing / Computing / Technology / Electronic commerce / Security / Malware

  2013 State of the Endpoint Sponsored by Lumension Independently conducted by Ponemon Institute LLC Publication Date: December 2012

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2012-12-14 10:20:46
258Computer network security / Software testing / Data security / National security / Application security / Vulnerability / Information security management system / Software development process / Penetration test / Security / Computer security / Cyberwarfare

The State of Application Security A Research Study by Ponemon Institute LLC and Security Innovation The State of Application Security An Organizational Maturity study by

Add to Reading List

Source URL: www.securityinnovation.com

Language: English - Date: 2013-08-16 15:26:12
259Crime prevention / Mass surveillance / Privacy of telecommunications / Law enforcement / National Security Agency / Surveillance / Foreign Intelligence Surveillance Act / Computer security / Cloud computing / National security / Security / Public safety

July 2014 New America’s Open Technology Institute Policy Paper Surveillance Costs:

Add to Reading List

Source URL: www.newamerica.org

Language: English - Date: 2015-02-10 12:49:49
260Cyberwarfare / Computer security / Data security / Electronic commerce / Data breach / Malware / Computer network security / Security / Secure communication

The Post Breach Boom Sponsored by Solera Networks Independently conducted by Ponemon Institute LLC Publication Date: FebruaryPonemon Institute© Research Report

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2014-05-21 11:18:32
UPDATE