Cyber

Results: 13321



#Item
461Security / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Secure communication / International Multilateral Partnership Against Cyber Threats

Press Release Connected Vehicle Cybersecurity Creates Risks and Opportunities in Automotive Market, According to VDC Research Carmakers finally coming to grips with security threats, but still have a long road ahead. The

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-03-03 10:07:18
462Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Internal control / Information security / Cyber-security regulation

JH2015/005 2nd September 2015 JHC Cyber Risk Assessment Guidance Background checks: 1

Add to Reading List

Source URL: comitemaritime.org

Language: English - Date: 2015-09-14 04:38:33
463Computer security / Security / Cyberwarfare / Computer network security / Data security / E-commerce / Security controls / Vulnerability / Cyber security standards / Supply chain attack

GE Oil & Gas Cyber Security Solutions for Industrial Controls OVERVIEW

Add to Reading List

Source URL: www.geoilandgas.com

Language: English - Date: 2016-08-09 11:53:34
464Cyberwarfare / Computer security / Computing / Security / Cybercrime / National security / Computer network security / NIST Cybersecurity Framework / International Multilateral Partnership Against Cyber Threats / Commission on Enhancing National Cybersecurity / Cyber-security regulation / National Cybersecurity Center of Excellence

Commission on Enhancing National Cybersecurity MayNYC Meeting minutes

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-06-28 10:05:51
465Technology / Engineering / Science and technology / Emerging technologies / Cyber-physical system / Internet of things / Ontology / ASME / MIT Engineering Systems Division / National Institute of Standards and Technology / Draft:Ram Duvuru Sriram

Toward Internet of Everything: The Role of Ontologies Ram D. Sriram Chief, Software and Systems Division Information Technology Laboratory National Institute of Standards and Technology, Gaithersburg, MD 20899, USA URL:

Add to Reading List

Source URL: www.ncgia.buffalo.edu

Language: English - Date: 2016-05-18 12:38:26
466Business / United States / Donald Trump presidential campaign / Melania Trump / Joe Biden / Donald Trump / Michelle Obama / Speechwriter / Republican National Convention

Mullings An American Cyber-Column GOP Convention 2 Rich Galen

Add to Reading List

Source URL: www.mullings.com

Language: English - Date: 2016-07-19 11:31:25
467Security / Prevention / Cyberwarfare / Safety / National security / Cybercrime / E-commerce / Computer security / Resilience / Cyberterrorism / Insurance / Cyber-Insurance

Testimony of Peter J. Beshar Before the Presidential Commission on Enhancing National Cybersecurity

Add to Reading List

Source URL: www.marsh.com

Language: English - Date: 2016-05-16 15:41:54
468Computing / Software / Archive formats / Computer file formats / Ar / Transmission Control Protocol / Offset / Palm OS

Plumbing the depths: Registry Internals Eric R. Zimmerman Senior director, Kroll Cyber Security

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:35
469Security / Cyberwarfare / Computer network security / Computer security / National security / Cybercrime / Cryptography / University of California / Merced /  California / Threat

Wednesday,  October  2 8,  2 015  at  1 2:37:42  PM  Pacific  Daylight  Time Subject: Mandatory  Cyber  Security  Awareness  Training  by  Jan.  31,  2016 Date: Friday

Add to Reading List

Source URL: it.ucmerced.edu

Language: English - Date: 2015-12-01 12:48:01
470Engineering / Technology / Computing / Avionics / Embedded systems / Unmanned vehicles / Robotics / Unmanned aerial vehicle / Wireless / Cyber-physical system / Aircraft flight control system / Paparazzi Project

A Multicore Approach to Model-Based Analysis and Design of Cyber-Physical Systems Anil Kanduri1, Amir-Mohammad Rahmani1, Pasi Liljeberg1, Kaiyu Wan2, Ka Lok Man2,3, Juha Plosila1 1 Department of Information Technology,

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2013-12-16 08:28:50
UPDATE