Cyber-security regulation

Results: 835



#Item
311Cyberwarfare / Public safety / Computer security / Critical infrastructure protection / National Cyber Security Division / Cyber-security regulation / National security / Security / United States Department of Homeland Security

Summary of S. 2519, the National Cybersecurity Protection Act of 2014 S[removed]would codify the National Cybersecurity and Communications Integration Center at the Department of Homeland Security and the Center’s existi

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2014-12-11 10:02:11
312Public safety / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / Government / Howard Schmidt / Internet-related prefixes / United States Department of Homeland Security / Cyber-security regulation / Computer crimes / Security / Year of birth missing

Cover Story Thinking Strategically About Cyber Risk Safety and resilience will be transformational for today’s companies that view Internet security not as an expense but an investment, says the former Secretary of Ho

Add to Reading List

Source URL: thirdcreekadvisors.com

Language: English - Date: 2014-09-29 15:32:53
313Security / United States Department of Homeland Security / Computer crimes / National Cyber Security Division / Cyber-security regulation / United States Computer Emergency Readiness Team / International Multilateral Partnership Against Cyber Threats / Critical infrastructure protection / Software assurance / Computer security / National security / Cyberwarfare

Safeguarding and Securing Cyberspace Safeguarding and Securing Cyberspace The Department has the lead for the federal government for securing civilian government computer systems, and works with industry and state, loca

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-04 10:16:35
314Hacking / War / Military technology / Military science / Stuxnet / Cyberterrorism / United States Cyber Command / The Pew Charitable Trusts / Cyber-security regulation / Cyberwarfare / Computer crimes / Electronic warfare

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE OCTOBER 29, 2014 Experts believe nations, rogue groups, and malicious individuals will step up their assaults on communications networks, targeting institutions, f

Add to Reading List

Source URL: www.pewinternet.org

Language: English - Date: 2014-10-28 12:48:05
315Hacking / War / Military technology / Military science / Stuxnet / Cyberterrorism / United States Cyber Command / The Pew Charitable Trusts / Cyber-security regulation / Cyberwarfare / Computer crimes / Electronic warfare

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE OCTOBER 29, 2014 Experts believe nations, rogue groups, and malicious individuals will step up their assaults on communications networks, targeting institutions, f

Add to Reading List

Source URL: www.pewinternet.org

Language: English - Date: 2014-11-04 14:10:15
316Electronic warfare / Cyberwarfare / Infrastructure / Public safety / Critical infrastructure protection / Cyber-security regulation / North American Electric Reliability Corporation / Electromagnetic pulse / International Multilateral Partnership Against Cyber Threats / National security / Security / United States Department of Homeland Security

101000101010110101001010101011010100101110101010010111010101010101 101101010101010110110101010101001010101010101010101011010100101010 010111010110101100101010101010101010101010010101010101011010101010 the cip report C E

Add to Reading List

Source URL: cip.gmu.edu

Language: English - Date: 2014-04-21 09:09:02
317Crime prevention / Cyberwarfare / United States Department of Homeland Security / Computer security / National Strategy to Secure Cyberspace / Information security / National Security Agency / Cyber-security regulation / Proactive Cyber Defence / Security / National security / Public safety

About the National Science and Technology Council The National Science and Technology Council (NSTC) was established by Executive Order on November 23, 1993. This Cabinet-level Council is the principal means for the Pre

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 10:56:28
318Secure communication / Computer security / Electronic warfare / Military technology / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Security / Computer network security / Cyberwarfare

Protect your intellectual property One of the main motivations for cyber attack is considered to be competitors seeking commercial advantage. This is consistent with findings from recent research, which indicates that th

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-01-04 09:16:06
319International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Cyber-security regulation / Computer security / National security / Public safety / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Computer crimes / Security

At the Nexus of Cybersecurity and Public Policy Some Basic Concepts and Issues Computer Science and Telecommunications Board ∙ Division on Engineering & Physical Sciences ∙ May 2014 Our nation is increasingly depende

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2014-09-14 11:12:25
320Computer security / Crime prevention / National security / Secure communication / Cyber-security regulation / Public safety / National Cyber Security Division / Cyberwarfare / Security / Computer network security

October 10, 2014 Submitted electronically to [removed] Comments of the Communications Sector Coordinating Council Re: “Experience with the Framework for Improving Critical Infrastructure Cybersecurity”

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-23 14:08:46
UPDATE