Cyber-security regulation

Results: 835



#Item
151Cyberwarfare / Computer network security / Crime prevention / Threat / United States Cyber Command / Information security / Cyber-security regulation / National Cyber Security Division / Security / National security / Computer security

II 112TH CONGRESS 2D SESSION S. 2151

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-08 17:03:23
152Computer security / National security / Data security / Information security / Security guard / Vulnerability / Cyber-security regulation / Cyber security standards / Security / Crime prevention / Public safety

NEW YORK STATE ,) DEPARTMENTof FINANCIAL SERVICES Andrew M. Cuomo Governor

Add to Reading List

Source URL: www.dfs.ny.gov

Language: English - Date: 2015-03-26 12:30:12
153United States Department of Homeland Security / Cyber-security regulation / Crime / Critical infrastructure protection / War / International Cybercrime / Computer crimes / Cyberwarfare / National security

CYBER MATURITY IN THE ASIA–PACIFIC REGION 2014

Add to Reading List

Source URL: aspi.org.au

Language: English - Date: 2014-04-24 00:27:04
154Crime prevention / Security engineering / United States Department of Homeland Security / Computer security / Institute for Information Infrastructure Protection / Critical infrastructure protection / Information security / Cyberwarfare / Cyber-security regulation / Security / National security / Public safety

CTO Corner July 2013 R&D in the Financial Services Sector Dan Schutzer, CTO, BITS This column discusses the importance to our industry of investing in research directed at

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-07-02 17:52:02
155Hacking / Military science / War / Electronic warfare / Military technology / Cyber-security regulation / United States Cyber Command / Cyberspace / Cyberterrorism / Cyberwarfare / Computer crimes / Security

  National Center for Digital Government    

Add to Reading List

Source URL: www.umass.edu

Language: English - Date: 2013-03-14 16:12:13
156Cyberwarfare / Computer network security / Computer security / Secure communication / Hacker / Password / Data breach / Cyber spying / Cyber-security regulation / Security / National security / Computer crimes

People’s Role in Cyber Security: Academics’ Perspective White Paper by Crucial Research September, 2014 Whitepaper by http://www.crucial.com.au |People’s Role in Cyber Security | 1

Add to Reading List

Source URL: www.crucial.com.au

Language: English - Date: 2014-10-09 18:33:55
157Cyberwarfare / Military technology / Advanced persistent threat / War / Cyber-security regulation / Malware / Computer security / International Cybercrime / Department of Defense Cyber Crime Center / Hacking / Security / Electronic warfare

How to Thwart the Digital Insider – an Advanced Persistent Response to Targeted Attacks A Trend Micro Opinion Piece By Tom Kellermann, Vice President of Cyber Security, Trend Micro Inc.

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-10-01 14:44:26
158Computer network security / Computer security / Crime prevention / Secure communication / Cyber-security regulation / Security / National security / Cyberwarfare

IBM Applauds Presidential Cyber Security Initiatives Washington, D.C. (January 21, 2015) – IBM today issued the following statement of support for President Obama’s recent efforts to enhance U.S. cyber security: “A

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2015-01-20 16:46:47
159Military science / Hacking / Computer network security / Computer security / Information warfare / Internet-related prefixes / Attack / Risk / Threat / Cyberwarfare / Electronic warfare / War

What Ethics Has To Do With the Regulation of Cyberwarfare by Mariarosaria Taddeo Since the first cyber-attack to Estonian websites in 2008, the debate surrounding the regulation of cyberwarfare has grown fast and has

Add to Reading List

Source URL: www.ethikundmilitaer.de

Language: English - Date: 2014-11-27 11:41:49
160Infrastructure / Cyberwarfare / Security engineering / Critical infrastructure protection / Computer security / Critical infrastructure / Cyber-security regulation / Internet kill switch / National security / United States Department of Homeland Security / Security

Defending America’s Cyberspace National Plan for Information Systems Protection Version 1.0

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 01:15:58
UPDATE