Cyber-security regulation

Results: 835



#Item
91Hacking / Military technology / Security / War / Crime / Computer security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Electronic warfare / Computer crimes

deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
92Computer security / Cyberwarfare / Computer network security / Secure communication / Information security / Vulnerability / Advanced Encryption Standard / Cyber-security regulation / Security / Crime prevention / National security

Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F’SATI)

Add to Reading List

Source URL: www.fsati.org

Language: English - Date: 2015-03-20 02:29:15
93War / Electronic warfare / Hacking / Military technology / Computer security / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / Cyberspace / Internet-related prefixes / Cyberwarfare / Computer crimes / Security

PDF Document

Add to Reading List

Source URL: www.orfonline.org

Language: English - Date: 2014-03-04 06:13:16
94National Telecommunications and Information Administration / Government / Business / Politics / DigitalEurope / Cyber-security regulation / Information Technology Industry Council

For immediate release: October 16, 2013 Global Tech Groups Release Recommendations for Internet Growth, Benefits, Security SEOUL, Korea – A strong coalition of global technology business organizations today released a

Add to Reading List

Source URL: home.jeita.or.jp

Language: English - Date: 2013-10-16 00:42:31
95United States Department of Homeland Security / National security / Cyberwarfare / HITRUST / International Multilateral Partnership Against Cyber Threats / Computer security / TRAC / Electronic health record / Cyber-security regulation / Security / Public safety / Computer crimes

Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: “Cybersecurity: The Evolving Nature of Cyber Threats Facing

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-03-17 17:56:25
96Computer security / Actuarial science / Risk management / Cyber-security regulation / Information security / Risk / Critical infrastructure / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Security / Public safety / National security

On behalf of the Information Technology Sector Coordinating Council (IT SCC), we appreciate the opportunity to provide input to the National Institute of Standards and Technology (NIST) to its Request for Information (RF

Add to Reading List

Source URL: www.it-scc.org

Language: English - Date: 2015-03-03 10:54:49
97Public safety / Computer crimes / National Cyber Security Alliance / National Cyber Security Awareness Month / National security / Computer security / Internet safety / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / United States Department of Homeland Security / Crime prevention / Security

FOR IMMEDIATE RELEASE National Cyber Security Alliance Aligns with RSA Conference to Empower Digital Citizens to Stay Current in the Ever-changing Cybersecurity Environment NCSA Continues its Mission to Promote Online S

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-13 11:44:59
98Crime prevention / Computer network security / Cyberwarfare / Information security / Attack / National Security Agency / Cyber-security regulation / Cyber security standards / Security / Computer security / National security

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:50:34
99Computer network security / Crime prevention / National security / Information security / Vulnerability / Threat / Malware / Phishing / Cyber-security regulation / Security / Cyberwarfare / Computer security

Security Outlook: Look Out! What to watch for in 2015 Presented by: W. Jackson Schultz Security Consultant – Information Security Practice

Add to Reading List

Source URL: www.mitx.org

Language: English - Date: 2015-01-02 14:03:00
100Law / Criminology / Convention on Cybercrime / Computer crime / International Multilateral Partnership Against Cyber Threats / Computer security / CyberCrime / Cyber-security regulation / Computer crimes / Crime / International Cybercrime

POLICY BRIEF 73 | JANUARYThe AU’s cybercrime response A positive start, but substantial challenges ahead Eric Tamarkin

Add to Reading List

Source URL: www.issafrica.org

Language: English - Date: 2015-01-20 04:34:35
UPDATE