Cyberwarfare

Results: 11990



#Item
541Cyberwarfare / Denial-of-service attacks / Computing / Internet Relay Chat / Cyberspace / Computer network security / Cybercrime / Denial-of-service attack / DDoS mitigation / Computer security / Neustar / Prolexic Technologies

APRIL 2016 NEUSTAR DDOS ATTACKS & PROTECTION REPORT THE THREATSCAPE WIDENS: DDOS AGGRESSION AND THE EVOLUTION OF IOT RISKS INTRODUCTION

Add to Reading List

Source URL: ns-cdn.neustar.biz

Language: English - Date: 2016-04-25 09:51:01
542Malware / Malware analysis / Cyberwarfare / Computer viruses / Carding / Computer security

Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

Add to Reading List

Source URL: maecproject.github.io

Language: English - Date: 2016-06-15 18:10:07
543Malware / Ransomware / Cyberwarfare / Computer security / Encryption / TeslaCrypt / Encrypting File System

How to remove CoinVault ransomware from your computer and restore your files Step 1: Are you infected with CoinVault? It is fairly easy to see if you are infected with CoinVault, because if you are, you will see an image

Add to Reading List

Source URL: noransom.kaspersky.com

Language: English - Date: 2015-10-29 06:42:31
544Computing / Cyberwarfare / Computer security / E-commerce / Deception / Computer network security / Secure communication / Internet security / Malvertising / Malware / Ransomware / SonicWall

Microsoft Word - Dell_Security Threat Report_Exec Summary_021816_4pm PT

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-04-25 15:10:36
545Cyberwarfare / Actuarial science / Financial regulation / International finance institutions / Systemic risk / International Organization of Securities Commissions / Risk management / Computer security / Global financial system / Enterprise risk management / Derivative / Cyber-security regulation

EBF, GFMA and ISDA Publish Principles to Promote Effective Global Policy on Cybersecurity, Data and Technology

Add to Reading List

Source URL: www.ebf-fbe.eu

Language: English - Date: 2016-05-10 04:10:04
546Systematic review / Cyberwarfare / Computer network security / Qualitative research / Meta-analysis / Computer security / Bias / Exploratory research / Publication bias / Trustwave Holdings / Malware

COLUMNS Exploring with a Purpose D A N G E E R A N D J AY J A C O B S Dan Geer is the CISO for In-QTel and a security researcher with a quantitative bent. He has

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-20 09:35:48
547Cyberwarfare / Federal Information Security Management Act / United States Department of Homeland Security / NIST Cybersecurity Framework / Computer security / Chief information security officer / Cyber-security regulation / National Cybersecurity Center of Excellence

Review-Doc-2015-ITORdocx

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-10-30 16:10:53
548Economy / Security / Crime prevention / National security / Computer network security / Computer security / Cryptography / Cyberwarfare / Credit score / Credit card / Credit bureau

The Western Hemisphere Credit & Loan Reporting Initiative (WHCRI) Legal and regulatory frameworks: Impact on credit reporting systems Mexico, January 2009

Add to Reading List

Source URL: cemla.org

Language: English - Date: 2013-10-17 16:39:36
549Cyberwarfare / Cybercrime / Computer security / Computer network security / Secure communication / EHNAC / Health Insurance Portability and Accountability Act / Cybersecurity Information Sharing Act / United States Department of Homeland Security / Accreditation / Cyber-security regulation / Cyber security standards

Cybersecurity Protection in Healthcare: How Accreditation Can Mitigate Your Risk

Add to Reading List

Source URL: www.ehnac.org

Language: English - Date: 2016-05-09 17:07:24
550Information technology management / Cyberwarfare / Email / Malware / Downtime / Computer security / Microsoft Edge

JTnet’s proactive approach to IT Your network. Your servers. Is this what you’re thinking about when you could be working, or better yet, enjoying your life? If you’re on the verge of a full-blown

Add to Reading List

Source URL: www.jtnetinc.com

Language: English - Date: 2010-11-12 16:48:06
UPDATE