Cyber threat intelligence

Results: 83



#Item
51Basketball / ULEB Cup 2004–05 Regular Season Group A

SANS Cyber Threat Intelligence Summit Recent Threat Trend Analysis Scott Montgomery VP, CTO Public Sector [removed]

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-02-18 18:51:46
52Internet-related prefixes / Prefixes

THE DOLLARS AND “SENSE” BEHIND THREAT INTELLIGENCE SHARING[removed] © Cyber Squared Inc[removed]

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-02-18 18:53:34
53Security / Computer crimes / Military intelligence / Computer security / Booz Allen Hamilton / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Open-source intelligence / Threat / National security / Intelligence / Data collection

Predictive Intelligence PI Actionable Insight for the Digital Enterprise AUGUST 2014

Add to Reading List

Source URL: www.boozallen.com

Language: English - Date: 2015-01-09 00:35:01
54Computer security / Computer network security / Computer crimes / Threat / International Multilateral Partnership Against Cyber Threats / Counterintelligence / Risk management / Defense Intelligence Agency / Intelligence and National Security Alliance / Security / National security / Cyberwarfare

Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD[removed]Thursday, October 9, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-23 14:08:46
55Computer crimes / Public safety / National Cyber Security Division / National security / International Multilateral Partnership Against Cyber Threats / Computer security / Department of Defense Cyber Crime Center / DHS Science and Technology Command /  Control /  and Interoperability Division / United States Department of Homeland Security / Security / Cyberwarfare

Cyber Threat Intelligence Coordinating Group (CTICG) “Building a Communication Bridge Between Cyber and Physical Security” Recognizing the Relationship Between Physical and Cyber Security

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-12-15 08:46:44
56War / Crime / Computer emergency response team / Denial-of-service attack / Cyber security and countermeasure / Cyber-security regulation / Cyberwarfare / Computer crimes / Computer security

Cyber security – the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present – and every business is at risk. Australia’s security and intelligence agencies have st

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2014-12-09 20:51:00
57Database management systems / Database theory / NoSQL / Internet Identity / Database / Scalability / Apache Cassandra / Data center / Relational database / Data management / Computing / Data

FRAUD DETECTION IID RELIES ON DATASTAX FOR AROUNDTHE-CLOCK CYBER THREAT MITIGATION Internet Identity (IID) is a cyber security company that provides the platform to easily exchange cyber threat intelligence between ente

Add to Reading List

Source URL: www.datastax.com

Language: English - Date: 2014-08-13 17:36:55
58National security / Intelligence / Check Point / Deep packet inspection / Threat / Central Intelligence Agency / Military intelligence / Computer network security / Espionage / Cyberwarfare

Check Point ThreatCloud IntelliStore  |  Datasheet CHECK POINT Check Point pioneers cyber intelligence

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2014-07-22 16:23:21
59Security / Computer crimes / Computer security / Cyberwarfare / Electronic warfare / Advanced persistent threat / Cyber spying / Hacktivism / Hacker / Cybercrime / Hacking / Computing

2014 CYBER-THREATS AND TRENDS These key findings of its 2014 Cyber-Threat and Trends Report reflect Verisign iDefense Security Intelligence Services’ focus on three critical information requirements (CIRs): cyber-crime

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-07-18 15:15:04
60National security / Cyberwarfare / Government / Central Intelligence Agency / International Multilateral Partnership Against Cyber Threats / Secretaría de Inteligencia / Computer security / KPMG tax shelter fraud / Security / Computer crimes / KPMG

Cyber threat intelligence and the lessons from law enforcement

Add to Reading List

Source URL: www.kpmg.com

Language: English
UPDATE