Cyberwarfare in the United States

Results: 459



#Item
11Government / Prevention / Safety / Customs services / Security / Law enforcement in the United States / Port security / Cyberwarfare / Supply chain management / American Association of Port Authorities / United States Department of Homeland Security / Maritime security

Testimony by Mr. David A. Espie Director of Security Maryland Port Administration, Port of Baltimore On behalf of the American Association of Port Authorities (AAPA)

Add to Reading List

Source URL: docs.house.gov

Language: English
12Software / Computing / Security / Cybercrime / Cyberwarfare / First Amendment to the United States Constitution / Computer network security / Computer security / Cryptography / Internet censorship / Facebook / Freedom of speech in the United States

Microsoft WordMedia Institute Luncheon Remarks - APPROVED.docx

Add to Reading List

Source URL: www.mediainstitute.org

Language: English - Date: 2016-04-13 15:41:25
13Cybercrime / National security / Cyberwarfare / Computer security / Hacking / United States Cyber Command / United States Army Cyber Command / Cyber / Cyberwarfare in the United States / Military-digital complex

THE FACTS: CYBERSECURITY RESOURCES A collection of resources to help you protect yourself online. Free antivirus software is available online for DoD employees to download and use at home (authentication required) Websit

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
14Cyberwarfare / United States Department of Homeland Security / Computer security

MSC Newsletter - March & April 2016 MSC to host Active Shooter and Cybersecurity Discussion-Based Tabletop Exercises at the Port of New Orleans. MSC Research PI Brant Mitchell, Director, Stephenson Disaster Management In

Add to Reading List

Source URL: web-oup.s3-fips-us-gov-west-1.amazonaws.com

Language: English - Date: 2016-05-03 12:26:11
15National security / Cybercrime / Hacking / Military technology / Cyberwarfare / Cyberwarfare in the United States / United States Cyber Command / Computer security / MIT Lincoln Laboratory / Cyber-attack / Cyber-Insurance

Cyber Security Research at Lincoln Laboratory Marc A. Zissman and Robert K. Cunningham Department of Defense missions increasingly are fought in and through the cyber domain.

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 14:35:26
16Cybercrime / National security / Intelligence / Cyberwarfare / Hacking / Cyber-attack / Computer security / Peacebuilding / Espionage / Cyberwarfare in the United States / United States Cyber Command

Conflict, security and defence The Court of Justice’s Advocate General Gerhard Reischl emerges as the crucial player in closing the rift opened up by Solange between Bonn and Brussels (the legal ramifications of the ju

Add to Reading List

Source URL: ridt.co

Language: English - Date: 2015-12-18 07:31:23
17National security / Cybercrime / Cyberwarfare / Cyberspace / Information Age / William Gibson / Computer security / National Strategy to Secure Cyberspace / Cyberwarfare in the United States

National Security College National Security College Professional Development Course Cyber Challenges for the National Security Community

Add to Reading List

Source URL: nsc.anu.edu.au

Language: English - Date: 2016-05-31 04:44:03
18Security / Government / Safety / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

Add to Reading List

Source URL: txdps.state.tx.us

Language: English - Date: 2015-10-22 14:12:04
19Security / Safety / Prevention / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

Add to Reading List

Source URL: www.txdps.state.tx.us

Language: English - Date: 2015-10-22 14:12:04
20Electronic warfare / Hacking / Military technology / SCADA / Telemetry / Stuxnet / Computer security / Critical infrastructure protection / Cyberwarfare in the United States / Technology / Cyberwarfare / Security

ThetaRay_Logo_Options_Draft7

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 19:30:32
UPDATE