Defense in depth

Results: 65



#Item
31Computer network security / APL programming language family / Data security / National security / APL / Defense in depth / Information assurance / Applied Physics Laboratory / Information security / Computing / Security / Computer security

S. C.  LEE  and  D. M. GREGG  From Art to Science: A Vision for the Future of Information Assurance Susan C. Lee and Donna M. Gregg

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2006-09-15 16:07:56
32Cyberwarfare / Data security / Crime prevention / National security / Defense in depth / Vulnerability / Security controls / Information security audit / Computer security / Computer network security / Security

Proceedings 8th Layered Assurance Workshop LAW 2014 Proceedings

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2014-12-04 10:52:56
33Computer network security / Computer security / Crime prevention / National security / National Defense Industrial Association / United States Agency for International Development / Boeing / Business / Government / Security / Military industry / Electronic commerce

NDIA’s Upcoming SSTRO Conference Promises In-Depth, Insightful Discussion, Analysis For All Attendees With a theme of “Navigating Uncertainty, Managing Change: Applying Lessons Learned for Mission Success in the Face

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-06-04 03:04:19
34Security / Evasion / Firewall / Rootkit / Intrusion prevention system / Honeypot / Computer network security / Computer security / Cyberwarfare

Agile Defensive Technologies IOC Bucket, LLC Agenda  Anatomy of the Attack  Defense in Depth Capabilities

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-02-18 18:41:54
35Security / Network security / Vulnerability / Password / DMZ / SCADA / Firewall / SAINT / Defense in depth / Computer network security / Computer security / Cyberwarfare

Mitigations for Security Problems Found in Control System Networks

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-04-10 12:30:16
36Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Technical Brief Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2014-12-13 18:32:35
37Disaster preparedness / Humanitarian aid / Civil defense / National security / Resilience / Security / American Society of Civil Engineers / Psychological resilience / American Water Works Association / Emergency management / Public safety / Engineering

NIST Disaster Resilience Fellows 10 October 2014 The Disaster Resilience Fellows are nationally recognized leaders in their field of expertise and brings a breadth and depth of knowledge and experience to advance the Fra

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-10-10 11:23:20
38Antivirus software / Malware

CASE STUDY SERIES! LEADING CHEMICALS COMPANY USES CLICK COMMANDER TO REDUCE RISK OF IP EXFILTRATION! One year ago, a Fortune 250 industrial products company had made improvements in its security defense in depth, but co

Add to Reading List

Source URL: www.clicksecurity.com

Language: English - Date: 2014-10-21 21:41:57
39Cyberwarfare / Computer network security / Data breach / Secure communication / Internet privacy / United States Department of Veterans Affairs / Information security / United States Computer Emergency Readiness Team / Security / Computer security / Data security

Information Security Monthly Activity Report* October 2014 VA uses a defense-in-depth approach to information security to protect the data we hold on Veterans. While the defense-in-depth approach protects from inbound t

Add to Reading List

Source URL: www.va.gov

Language: English - Date: 2014-11-13 13:55:40
40Security / SCADA / Vulnerability / DMZ / Firewall / International Multilateral Partnership Against Cyber Threats / Attack / International Cybercrime / National Cyber Security Division / Computer network security / Computer security / Cyberwarfare

Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies October 2009

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-04-10 12:30:15
UPDATE