Cyber-attack

Results: 386



#Item
51Cyber War Chronicles Stories from the Virtual Trenches Ron Winward Security Evangelist Radware, Inc. March 17, 2016

Cyber War Chronicles Stories from the Virtual Trenches Ron Winward Security Evangelist Radware, Inc. March 17, 2016

Add to Reading List

Source URL: www.dataconnectors.com

Language: English - Date: 2016-03-22 16:24:00
52Cybersecurity and Resilience Challenges and Opportunities for Self-Driving Cars Session 19 Moderator: Edward Fok USDOT/Federal Highway Administration Email:

Cybersecurity and Resilience Challenges and Opportunities for Self-Driving Cars Session 19 Moderator: Edward Fok USDOT/Federal Highway Administration Email:

Add to Reading List

Source URL: higherlogicdownload.s3.amazonaws.com

Language: English - Date: 2016-07-27 09:28:40
53USING AN  EXPANDED CYBER KILL CHAIN MODEL TO INCREASE ATTACK RESILIENCY

USING AN EXPANDED CYBER KILL CHAIN MODEL TO INCREASE ATTACK RESILIENCY

Add to Reading List

Source URL: www.seantmalone.com

Language: English - Date: 2016-08-04 16:29:49
54Stefanie Schmahl, Cybersecurity, in: Freiheit und Regulierung in der Cyberwelt – Rechtsidentifikation zwischen Quelle und Gericht, Berichte DGIR Bd. 47, HeidelbergSummary by Prof. Dr. Stefanie Schmahl, Würzburg

Stefanie Schmahl, Cybersecurity, in: Freiheit und Regulierung in der Cyberwelt – Rechtsidentifikation zwischen Quelle und Gericht, Berichte DGIR Bd. 47, HeidelbergSummary by Prof. Dr. Stefanie Schmahl, Würzburg

Add to Reading List

Source URL: www.dgfir.de

Language: English - Date: 2016-04-19 08:15:24
55Cybersecurity – companies, you are under attack The cyber threat is omnipresent. A quick look at newspaper headlines reveals that companies from a variety of sectors such as financial services provider JP Morg

Cybersecurity – companies, you are under attack The cyber threat is omnipresent. A quick look at newspaper headlines reveals that companies from a variety of sectors such as financial services provider JP Morg

Add to Reading List

Source URL: www.robecosam.com

Language: English - Date: 2016-06-15 04:29:16
56Die Fakultät für Informatik der Universität Wien lädt Sie herzlich ein zum CS-Colloquium Security of Cyber-Physical Systems (A Case Study)

Die Fakultät für Informatik der Universität Wien lädt Sie herzlich ein zum CS-Colloquium Security of Cyber-Physical Systems (A Case Study)

Add to Reading List

Source URL: cs.univie.ac.at

Language: English
57COMMISSION ON ENHANCING NATIONAL CYBERSECURITY Meeting of the Commission on Enhancing National Cybersecurity PANELIST STATEMENTS

COMMISSION ON ENHANCING NATIONAL CYBERSECURITY Meeting of the Commission on Enhancing National Cybersecurity PANELIST STATEMENTS

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2016-05-16 16:29:59
58IT ADVISORY  Cyber Security: from threat to opportunity

IT ADVISORY Cyber Security: from threat to opportunity

Add to Reading List

Source URL: www.kpmg.com

Language: English
59COMMISSION ON ENHANCING NATIONAL CYBERSECURITY Meeting of the Commission on Enhancing National Cybersecurity PANELIST STATEMENTS

COMMISSION ON ENHANCING NATIONAL CYBERSECURITY Meeting of the Commission on Enhancing National Cybersecurity PANELIST STATEMENTS

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-05-16 16:29:59
60CYBER AND THE CITY Making the UK financial and professional services sector more resilient to cyber attack May 2016  $

CYBER AND THE CITY Making the UK financial and professional services sector more resilient to cyber attack May 2016 $

Add to Reading List

Source URL: www.thecityuk.com

Language: English - Date: 2016-05-24 09:37:34