Cyber

Results: 13321



#Item
291

WILLIS SPECIAL REPORT: 10K DISCLOSURES – HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune  It is par

Add to Reading List

Source URL: www.willis.com

- Date: 2014-04-14 16:50:47
    292

    Cyber Self - Assessment According to Protecting Personal Information – A Guide for Business1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have in your fi

    Add to Reading List

    Source URL: americanpetproducts.org

    - Date: 2016-01-21 16:38:39
      293

      Leveraging Data Provenance to Enhance Cyber Resilience Thomas Moyer Karishma Chadha, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, Trent Jaeger, and Patrick Cable IEEE SecDev

      Add to Reading List

      Source URL: cybersec-prod.s3.amazonaws.com

      - Date: 2016-12-07 14:36:43
        294

        LA COMMUNAUTE DE COMMUNES DU CANTON D’HUCQUELIERShabitants répartis sur 24 communes Située à l’ouest du Département du Pas-de-Calais Dans le cadre de la création d’un service mutualisé « d’instructi

        Add to Reading List

        Source URL: cyber.canton.free.fr

        - Date: 2016-10-11 10:51:37
          295

          nso group NSO Group is a leader in the field of Cyber warfare.The company works with military and homeland security organizations in order to enhance their

          Add to Reading List

          Source URL: assets.documentcloud.org

          - Date: 2013-11-18 06:43:53
            296

            Microsoft Word - us_cyber_command_abstract

            Add to Reading List

            Source URL: www.stopeg.com

            - Date: 2015-10-12 14:11:51
              297

              Analyzing Spammer’s Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter Chao Yang Robert Harkreader

              Add to Reading List

              Source URL: faculty.cse.tamu.edu

              - Date: 2012-02-27 10:41:35
                298

                National Cyber Security Strategy

                Add to Reading List

                Source URL: www.gov.uk

                - Date: 2016-11-24 03:55:17
                  299

                  National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA) Critical Infrastructure Security and Resilience Note CONSEQUENCES TO SEAPORT OPERATIONS FROM MALICIOUS CYBER ACTIVITY

                  Add to Reading List

                  Source URL: info.publicintelligence.net

                  - Date: 2016-09-11 19:09:27
                    300

                    EFL SMARTblog - How safe are you online? (Cyber Bullying) _http://efllecturer.blogspot.com.eshow-safe-are-you-online-cyber-bullying.html_ Listen and fill in the gaps A) Rhada talking about the phone-in program

                    Add to Reading List

                    Source URL: dl.dropboxusercontent.com

                      UPDATE