Computer Security Institute

Results: 1676



#Item
581Computer network security / Crime prevention / National security / Insider / Threat / Institute for Information Infrastructure Protection / United States Department of Homeland Security / Vulnerability / Abuse / Cyberwarfare / Computer security / Security

Combating the Insider Threat 2 May 2014 DISCLAIMER: This advisory is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-05-06 13:13:58
582Penetration test / Learning / Computing / Virtual learning environment / Computer security / Global Information Assurance Certification / SANS Institute

SANS/CIS Partnership Aggregate Buy Program | sans.org/partnership/cis SANS’s mission is to ensure that InfoSec practitioners in critical organizations have the skills needed to protect national security. The mission of

Add to Reading List

Source URL: alliance.cisecurity.org

Language: English - Date: 2014-11-03 10:37:26
583Penetration test / Learning / Computing / Virtual learning environment / Computer security / Global Information Assurance Certification / SANS Institute

SANS/CIS Partnership Aggregate Buy Program | sans.org/partnership/cis SANS’s mission is to ensure that InfoSec practitioners in critical organizations have the skills needed to protect national security. The mission of

Add to Reading List

Source URL: alliance.cisecurity.org

Language: English - Date: 2014-11-03 10:35:28
584Penetration test / Learning / Computing / Virtual learning environment / Computer security / Global Information Assurance Certification / SANS Institute

SANS/CIS Partnership Aggregate Buy Program | sans.org/partnership/cis SANS’s mission is to ensure that InfoSec practitioners in critical organizations have the skills needed to protect national security. The mission of

Add to Reading List

Source URL: alliance.cisecurity.org

Language: English - Date: 2014-11-03 10:32:35
585Data security / Management / Risk analysis / IT risk / COBIT / Security risk / National Institute of Standards and Technology / Cyber security standards / NIST Special Publication 800-53 / Computer security / Security / Information technology management

Dear Sir and Madam, At Wisegate we are keenly aware of the need for the US to have a high functioning, flexible and secure IT infrastructure. We understand how our nations security, economy and health of the citizens are

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:21:53
586Computer network security / FireEye /  Inc. / International Multilateral Partnership Against Cyber Threats / Vulnerability / Security controls / Security risk / Threat / Malware / Computer security / Security / Cyberwarfare

Response of FireEye to National Institute of Standards and Technology (NIST) Request for Information regarding the level of awareness throughout critical infrastructure organizations, and initial experiences with the Fra

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:43:27
587United States Department of Homeland Security / Security engineering / Computer crimes / Cyberwarfare / National Institute of Standards and Technology / TechAmerica / Critical infrastructure protection / International Multilateral Partnership Against Cyber Threats / Computer security / National security / Security / Public safety

October 10, 2014 Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD[removed]RE: TechAmerica comments in response to NIST RFI: “Experience with the Framework

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:28:44
588National security / Crime prevention / International Multilateral Partnership Against Cyber Threats / Information security / Security controls / Information assurance / Vulnerability / Framework Programmes for Research and Technological Development / Risk management / Security / Computer security / Data security

Motorola SolutionsExperience with the Framework for Improving Critical Infrastructure Cybersecurity Motorola Solutions (MSI) offers feedback to the National Institute of Standards and Technology (NIST) about the level

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:53:42
589Security / Computer security / Information technology governance / Auditing / Risk / COBIT / Information Systems Audit and Control Association / Information security management / Certified Information Security Manager / Data security / Information technology management / Information technology audit

10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD[removed]Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:48:57
590Cyberwarfare / National Institute of Standards and Technology / Computer network security / Computer law / Security controls / Federal Information Security Management Act / Information security / FIPS 140-2 / Standards for Security Categorization of Federal Information and Information Systems / Computer security / Security / Data security

MHDO DATA WAREHOUSE PORTAL F REQUENTLY A SKED Q UESTIONS (FAQ S ) Question: Where does the MHDO Data Warehouse reside? Describe what protections are in place for system security. Answer:

Add to Reading List

Source URL: mhdo.maine.gov

Language: English - Date: 2014-08-12 17:59:28
UPDATE