Cyberwarfare in the United States

Results: 459



#Item
71Technology / Digital media / Internet governance / Internet ethics / Electronics / Cyberterrorism / Internet / Computer emergency response team / United States Computer Emergency Readiness Team / Carnegie Mellon University / Cyberwarfare / Computer crimes

FOREWORD The progress of technological change tends to accelerate over time. In 1858, the Atlantic Cable was stretched across the sea connecting the United States of America to Europe with a form of real-time communicati

Add to Reading List

Source URL: www.coedat.nato.int

Language: English - Date: 2007-01-25 06:36:36
72Hacking / Security / Computer security / Military technology / Stuxnet / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Computer crimes / Electronic warfare

The Impact of Cyber Security on the South Australian Defence Industry SADILP 2013 Mathew Borgas, Jude Kennedy, Tracey Hart, Paul Sykes

Add to Reading List

Source URL: www.dtc.org.au

Language: English - Date: 2014-02-06 17:47:12
73United States Department of Homeland Security / Computer network security / Computer security / Secure communication / National security / Public safety / Cyber-security regulation / National Cyber Security Division / Cyberwarfare / Security / Computer crimes

April 16, 2013 Dear Members of the U.S. House of Representatives, The undersigned representatives of the financial services industry are writing in support of H.R. 756, the “Cybersecurity Enhancement Act”; H.R. 967,

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-04-18 11:14:54
74United States Department of Homeland Security / Security engineering / Internet in the United States / Cyber-security regulation / Critical infrastructure protection / Computer security / ICANN / Information warfare / National Strategy to Secure Cyberspace / Cyberwarfare / National security / Security

FOR IMMEDIATE RELEASE Ann Patterson, (Greg Rattray to Lead BITS Security Program Washington, D.C.— September 7, 2010— BITS, the technology policy division of The Financial Services Roundtable, announced

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:09
75Computer network security / Computer security / Hacking / National security / United States Cyber Command / Attack / Computer crimes / Cyberwarfare / Security

OPINION PIECE Private and public sectors must pull in same direction to combat cyber crime TOBIAS FEAKIN The Weekend Australian, Defence Supplement, p4

Add to Reading List

Source URL: aspi.org.au

Language: English - Date: 2013-10-09 20:40:11
76Security / Kansas / Insurance commissioner / Data breach / Insurance / Cyberwarfare / Financial economics / Anthem Blue Cross / Healthcare in the United States / Blue Cross Blue Shield Association / Anthem

Microsoft Word - Anthem breach release .docx

Add to Reading List

Source URL: www.ksinsurance.org

Language: English
77Law / Credit card / Data breach / Bank / Cyberwarfare / Bank regulation in the United States / Gramm–Leach–Bliley Act / Internet privacy / Security / Privacy law

Privacy Policy Statement China CITIC Bank International Limited (the “Bank”) is committed to protecting the privacy, confidentiality and security of the personal data we hold by complying with the requirements of Per

Add to Reading List

Source URL: www.cncbinternational.com

Language: English - Date: 2015-03-30 06:23:01
78Security / United States Department of Homeland Security / Computer crimes / International Telecommunication Union / Cyber-security regulation / National Telecommunications and Information Administration / National Cybersecurity Center / International Multilateral Partnership Against Cyber Threats / Government / Cyberwarfare / Computer network security / Computer security

Stakeholder Engagement on Cybersecurity in the Digital Ecosystem

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2015-03-17 11:20:17
79Hacking / Social engineering / Electronic warfare / Computer crimes / United States Cyber Command / Cyber spying / Byzantine Foothold / Phishing / Ghost Rat / Cybercrime / Cyberwarfare / Security

special report REUTERS/Rick Wilking In Cyberspy vs. cyberspy, China has the edge

Add to Reading List

Source URL: graphics.thomsonreuters.com

Language: English - Date: 2011-04-13 17:29:44
80Electronic warfare / Hacking / Military technology / Public safety / War / Computer security / Department of Defense Cyber Crime Center / United States Department of Homeland Security / National Cyber Security Division / Computer crimes / Security / Cyberwarfare

  April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Add to Reading List

Source URL: www.cdt.org

Language: English - Date: 2012-04-09 10:21:28
UPDATE