Cyber-security regulation

Results: 835



#Item
141Public safety / Cyberwarfare / National security / Federal Protective Service / National Protection and Programs Directorate / United States Computer Emergency Readiness Team / Federal Information Security Management Act / National Cyber Security Division / Cyber-security regulation / United States Department of Homeland Security / Security / Computer security

GAO-15-6, FEDERAL FACILITY CYBERSECURITY: DHS and GSA Should Address Cyber Risk to Building and Access Control Systems

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-01-12 13:49:23
142Password / Phishing / Hacker / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Cybercrime / Computer crimes / Computer security

cybersecurity.t halesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the weakest link in

Add to Reading List

Source URL: cybersecurity.thalesgroup.com.au

Language: English - Date: 2014-07-20 23:46:33
143Public safety / Cyber-security regulation / United States Department of Homeland Security / Computer security / Congressional Research Service / 111th United States Congress / 112th United States Congress / United States House Committee on Homeland Security / United States House Homeland Security Subcommittee on Transportation Security / Government / Cyberwarfare / Security

Cybersecurity: Authoritative Reports and Resources

Add to Reading List

Source URL: fpc.state.gov

Language: English - Date: 2015-04-19 01:26:06
144Military science / Cyberwarfare / War / United States Cyber Command / Cyber-security regulation / Military organization / Hacking / Electronic warfare / Military technology

We frequently hear the terms “Cyber 9/11” and “Digital Pearl Harbor,” but we rarely discuss what they actually mean or how to handle the consequences and to manage this kind of crisis situation. The Cyber 9/12 Pr

Add to Reading List

Source URL: gcsp.ch

Language: English
145Cyberwarfare / Computer security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National security / Cyber-security regulation / Federal Information Security Management Act / United States Department of Homeland Security / Risk management / Security / Public safety / Computer crimes

Creating an Adaptive Cybersecurity Culture Through the Agile Cybersecurity Action Plan (ACAP) John W. Link & Jo Lee Loveland Link

Add to Reading List

Source URL: volvoxinc.com

Language: English - Date: 2015-01-08 11:32:07
146Cyberwarfare / Computer security / National security / International Multilateral Partnership Against Cyber Threats / Threat / Cyber-security regulation / Personal Data Privacy and Security Act / Computer network security / Security / Computer crimes

NOTE: There are some conforming amendments that still need to be made, which were not addressed in the manager’s amendment adopted in Committee. They are highlighted. 114TH CONGRESS 1ST SESSION H. R. ll To improve cybe

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-03-26 17:53:58
147Security / United States Department of Homeland Security / Computer crimes / International Telecommunication Union / Cyber-security regulation / National Telecommunications and Information Administration / National Cybersecurity Center / International Multilateral Partnership Against Cyber Threats / Government / Cyberwarfare / Computer network security / Computer security

Stakeholder Engagement on Cybersecurity in the Digital Ecosystem

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2015-03-17 11:20:17
148Cyberwarfare / Security / Computer network security / Computer crimes / Cyber-security regulation / Congressional Research Service / United States Computer Emergency Readiness Team / United States Department of Homeland Security / National Strategy for Trusted Identities in Cyberspace / Government / Library of Congress / Computer security

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-04-01 12:55:47
149Computer security / Electronic warfare / Hacking / Military technology / Stuxnet / Computer insecurity / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Computer crimes / Security

CTO Corner January 2013 Taking Stock of Cyber in 2012: How have things changed and what should we do about it? Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-01-04 14:02:19
150National security / War / Computer crimes / Military technology / Cyber-security regulation / Psychological resilience / Resilience / International Multilateral Partnership Against Cyber Threats / Information security / Cyberwarfare / Security / Public safety

Report REP 429 Cyber resilience: Health check

Add to Reading List

Source URL: download.asic.gov.au

Language: English - Date: 2015-03-18 21:42:46
UPDATE