Cyber-security regulation

Results: 835



#Item
481Public safety / Computer crimes / Electronic warfare / Military technology / Computer security / United States Department of Homeland Security / Cyber-security regulation / National Cyber Security Division / Security / National security / Cyberwarfare

Vice President Governmental Programs 600 14th Street, NW Suite 300 Washington, DC 20005

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2012-07-26 09:21:22
482Privacy / Internet privacy / Cyber-security regulation / U.S. Department of Defense Strategy for Operating in Cyberspace / Ethics / Identity management / Law

April 15, 2013 Dear Representative: Earlier this year, many of our organizations wrote to state our opposition to H.R. 624, the Cyber Intelligence Sharing and Protection Act of[removed]CISPA). We write today to express our

Add to Reading List

Source URL: aallnet.org

Language: English
483Computing / Computer crimes / Mass surveillance / National Security Agency / United States government secrecy / Computer security / Gene Spafford / Cyber-security regulation / National Cybersecurity Center / Security / Cyberwarfare / National security

NEWS RELEASE – September 3, 2013 Contact: [removed] National Cyber Security Hall of Fame releases Final Selectees for the Class of 2013

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2013-09-06 16:31:35
484Cyberwarfare / Computing / Computer law / Federal Information Security Management Act / Risk analysis / Certification and Accreditation / Vivek Kundra / Cyber-security regulation / Asset / Computer security / Security / Data security

Z:ceLevinsonMAeral Cybersecurity Best Practice.ISCM.wpd

Add to Reading List

Source URL: www.thecre.com

Language: English - Date: 2013-04-20 07:39:35
485Garmisch-Partenkirchen / George C. Marshall European Center for Security Studies / Critical infrastructure protection / Cyber-security regulation / National security / United States Department of Homeland Security / Bundeswehr

PDF Document

Add to Reading List

Source URL: www.marshallcenter.org

Language: English - Date: 2014-07-22 09:45:50
486Security / National security / National Cyber Security Division / Cyber-security regulation / Einstein / National Cybersecurity Center / United States Computer Emergency Readiness Team / International Multilateral Partnership Against Cyber Threats / National Protection and Programs Directorate / United States Department of Homeland Security / Cyberwarfare / Computer security

Defense Writers Group Handout

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2011-10-18 11:08:37
487War / Comprehensive National Cybersecurity Initiative / Cyber-security regulation / Cyberspace / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Computer security / Security

Social Education 78(2), pp 96–100 ©2014 National Council for the Social Studies Technology Bringing the Cybersecurity

Add to Reading List

Source URL: www.usf.edu

Language: English - Date: 2014-04-28 09:40:42
488Criminal law / Computer network security / Identity / Identity theft / Theft / Computer security / Internet privacy / Child pornography / Cyber-security regulation / Computer crimes / Crimes / Security

cybercrime LAW REPORT Vol. 3, No. 8 April 21, 2003

Add to Reading List

Source URL: www.crime-research.org

Language: English - Date: 2005-09-13 11:16:16
489Cyberwarfare / United States Department of Homeland Security / Michael McCaul / Cyber-security regulation / Computer security / Critical infrastructure protection / Resilience / Information Technology Industry Council / National security / Security / Public safety

July 28, 2014 The Honorable Michael McCaul Chairman Committee on Homeland Security U.S. House of Representatives Washington, DC 20515

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2014-08-11 10:14:28
490Computer security / Technology / Security / Electronic warfare / Military technology / Twitter / Internet security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer network security / Hacking / Cyberwarfare

FOR IMMEDIATE RELEASE Contact: Kristen Anderson[removed]ext[removed]removed] Half of All Federal Agency Security Breaches Caused by Lack of User Compliance;

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2013-11-19 12:24:00
UPDATE