Cyberwarfare

Results: 11990



#Item
101Security / Cryptography / Cyberwarfare / Computer network security / Biological engineering / Body area network / Wireless networking / Internet privacy / Health informatics / Computer security / Encryption / Medical privacy

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-19 08:03:23
102Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Internal control / Information security / Cyber-security regulation

JH2015/005 2nd September 2015 JHC Cyber Risk Assessment Guidance Background checks: 1

Add to Reading List

Source URL: www.comitemaritime.org

Language: English - Date: 2015-09-14 04:38:33
103Cyberwarfare / Computer security / Malware / Espionage / Malware research / FinFisher / Pin / Binary star / Regin / Command and control / Spyware

    BIG GAME HUNTING: THE PECULIARITIES IN  NATION­STATE MALWARE RESEARCH      

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-08-05 21:02:05
104Security / Computer network security / Cyberwarfare / Computer security / Cryptography / National security / Public-order crime / Threat / Political faction / Classified information in the United Kingdom

VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK (VPDSF) VPDSF BUSINESS IMPACT LEVEL (BIL) TABLE

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-08-09 01:19:38
105Security / Computer security / Cyberwarfare / Computer network security / Crime prevention / Cryptography / National security / Government procurement in the United States / Critical infrastructure protection / NIST Cybersecurity Framework

DEFENSE CYBERSECURITY REQUIREMENTS: WHAT SMALL BUSINESSES NEED TO KNOW Office of Small Business Programs, U.S. Department of Defense 3600 Defense Pentagon, Room 3E185, Washington, DCWhy is cybersecurity impor

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
106Computer security / Cyberwarfare / Security / Cybercrime / Antivirus software / Computer network security / E-commerce / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:37
107Security / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / Skybox

Under embargo until release at 8am EST, Wednesday, February 3rd, 2016 Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth The fast-growing security analytics company will use funds to furth

Add to Reading List

Source URL: rembrandtvc.com

Language: English - Date: 2016-02-03 14:13:55
108Economy / Business / Security / Cybercrime / Cyberwarfare / National security / Small business / Small Business Administration / Computer security / New York State Small Business Development Center / Florida Small Business Development Center Network

Improving Small Business Cyber Security Act of 2016 Rep. Richard Hanna () | Rep. Derek Kilmer ()  Small businesses face a greater number of more sophisticated cyb

Add to Reading List

Source URL: hannaforms.house.gov

Language: English - Date: 2016-06-08 08:58:42
109Government / Security / Prevention / Cyberwarfare / National security / United States Department of Homeland Security / Resilience / Computer security / DHS National Protection and Programs Directorate / National Cyber Security Division

Joint Council Webinar Series At this Webinar, you will:

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2016-05-20 14:58:44
110Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / United States Department of Homeland Security / Information security / Professional certification

November 2, 2016 International Conference Registration Open, 7:00 am – 4:00 pm, Trinity A ISSA SIGs Sponsored Breakfast, 7:30 am – 8:15 am, Landmark B/C

Add to Reading List

Source URL: c.ymcdn.com

Language: English - Date: 2016-08-19 07:58:20
UPDATE