Cyberwarfare

Results: 11990



#Item
781Software testing / Software quality / Hacking / Computer network security / Vulnerability / Software assurance / Veracode / Web application security / CWE / Computing / Computer security / Cyberwarfare

Software Security Being Explicit About Security Weaknesses Robert A. Martin MITRE Corporation

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-03-02 12:21:16
782Electronic warfare / Military technology / Industrial automation / SCADA / Telemetry / Cyberwarfare / Anomaly detection / Malware / Statistics / Technology / Security / Hacking

ThetaRay_Logo_Options_Draft7

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 19:30:09
783Cyberwarfare / Advanced persistent threat / Security event manager / Hunting / Computer security / Security / Computer network security

DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2015-05-22 14:48:50
784Electronic commerce / Computer network security / Data breach / Secure communication / Cyberwarfare / Credit card / EMV / Card security code / Malware / Computer security / Security / Data security

asflj#fjrf^slfmec%vnun 12409C4QMCNAS9LKF2E 2014’s Biggest

Add to Reading List

Source URL: cdn.cardconnect.com

Language: English - Date: 2015-03-20 11:37:54
785Cyberwarfare / Malware / Phishing / Social engineering / Spamming / Computer security / Operations security / Spyware / Classified information / Security / Espionage / Computer network security

Ex+Op Power Point Master Slide Template, Oct 06, NU [D11]

Add to Reading List

Source URL: www.mc.nato.int

Language: English - Date: 2013-03-08 11:16:37
786Electronic commerce / Computer network security / Cyberwarfare / Payment Card Industry Data Security Standard / Security awareness / SecurityMetrics / Penetration test / Health Insurance Portability and Accountability Act / Threat / Computer security / Security / Data privacy

SecurityMetrics Data Security Awareness Training Your business is only as secure as its weakest link. Get comprehensive Data Security Awareness Training for your employees to avoid a possible breach. Data Security Aware

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
787Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWECWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
788Computing / Network security / Threat / Deep packet inspection / Cloud computing / Computer security / Traffic analysis / Computer network security / Cyberwarfare / Security

PW_TM_Tagline_Lockup_Stacked_Blue3

Add to Reading List

Source URL: www.protectwise.com

Language: English - Date: 2015-07-16 13:05:05
789Threat / Computer crimes / Electronic warfare / Hacking / Computing / Department of Defense Cyber Crime Center / Computer security / Cyberwarfare / Computer network security

Information Protection Protecting your customer and business data in today’s online environment requires an intelligence-led approach that focuses on identifying risks early for effective prevention and mitigation. Cyv

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 12:57:19
790Cyberwarfare / Deliverable / Vulnerability / Penetration test / Management / Software testing / Computer security / Project management

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2013-07-12 10:38:54
UPDATE