Computer Security Institute

Results: 1676



#Item
621Computer network security / Cyberwarfare / Data breach / Information security / Malware / Internet privacy / Threat / Remote data deletion / Computer security / Security / Data security

2011 Cost of Data Breach Study: United States Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2012-12-06 09:58:51
622Battelle Memorial Institute / Livermore Valley / United States Department of Energy National Laboratories / Blue Gene / FLOPS / IBM Sequoia / High-performance computing / Supercomputer / K computer / Computing / Parallel computing / Lawrence Livermore National Laboratory

High Performance Computing Employing the world’s fastest supercomputers to support national defense and research Lawrence Livermore National Laboratory (LLNL), a National Nuclear Security Administration (NNSA) research

Add to Reading List

Source URL: asc.llnl.gov

Language: English - Date: 2014-11-12 12:19:16
623DNA / Biology / Forensic science / Heuristics / Security / Computer forensics / Scientific Working Group / National Institute of Justice / DNA profiling / Science / Criminology / Biometrics

- 1 -1NAS plus 38 months Consortium of forensic science organizations September 2013

Add to Reading List

Source URL: www.theiai.org

Language: English - Date: 2013-09-20 15:13:48
624Lawrence Livermore National Laboratory / Livermore Valley / Livermore /  California / Science and technology in the United States / Security / United States / Information security / Government procurement in the United States / Subcontractor / United States Department of Energy National Laboratories / University of California / Battelle Memorial Institute

LAWRENCE LIVERMORE NATIONAL LABORATORY ACCESS TO LLNL COMPUTER RESOURCES PROVISIONS The following provisions shall apply if any Subcontractor personnel, at any tier, will have access to any LLNL computer resources either

Add to Reading List

Source URL: supplychain.llnl.gov

Language: English - Date: 2014-03-07 19:47:32
625Computing / Public safety / Federal Information Security Management Act / Information security / Security controls / Risk management framework / Personally identifiable information / National Institute of Standards and Technology / Internet privacy / Computer security / Security / Data security

Privacy Impact Assessment for Financial Partners Data Mart (FPDM)

Add to Reading List

Source URL: www2.ed.gov

Language: English - Date: 2014-12-19 09:36:41
626Cyberwarfare / Computer crimes / Information technology management / Risk analysis / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / IT risk / Federal Information Security Management Act / Risk management framework / Security / Computer security / Public safety

Submission to the National Institute Standards of Technology Response to the NIST Cybersecurity Framework Request for Information Comments of Dell, Inc. October 10, 2014 Via [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:41:24
627Public safety / Information technology management / Computer network security / Security controls / COBIT / National Institute of Standards and Technology / Information security / Regulatory compliance / Vulnerability / Computer security / Data security / Security

Staff Guidance on Current SCI Industry Standards

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2014-11-19 13:14:13
628National security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Chevron Corporation / Computer security / National Institute of Standards and Technology / Public safety / Security / Computer crimes / Crime prevention

Adapting NIST Cybersecurity Framework for Risk Assessment Kenny Mesker, ICS Cybersecurity Engineer, Chevron ETC NIST Conference, October 29, 2014

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-12-03 14:20:23
629Cyber-security regulation / Cyberwarfare / United States Department of Homeland Security / Computer crimes

October 10, 2014 Via [removed] Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive (Stop[removed]Gaithersburg, MD[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 15:12:37
630National security / National Institute of Standards and Technology / Computing / Computer storage / Data remanence / Sanitization / Federal Information Security Management Act / Standards for Security Categorization of Federal Information and Information Systems / Information security / Data security / Security / Computer security

Guidelines for Media Sanitization

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-12-17 11:27:47
UPDATE