Electronic warfare

Results: 1516



#Item
311Military technology / Security / Cyberwarfare / Military science / War / Cyberspace / International Multilateral Partnership Against Cyber Threats / Computer security / Department of Defense Strategy for Operating in Cyberspace / Electronic warfare / Computer crimes / Hacking

132nd IPU Assembly Hanoi (Viet Nam), 28 March - 1 April 2015 Standing Committee on Peace and International Security

Add to Reading List

Source URL: www.ipu.org

Language: English - Date: 2015-01-21 10:56:40
312Hacking / Military technology / Marketing / Cyberwarfare / Proposal / Radio France Internationale / Intelligence assessment / Business / War / Intelligence Advanced Research Projects Activity / Broadcasting / Electronic warfare

IARPA-RFI[removed]Synopsis Request for Information (RFI): Cyber Attack Data The Intelligence Advanced Research Projects Activity (IARPA) is seeking information on data sources for evaluation of cyber attack detection tools

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-07 13:03:17
313Hacking / Military technology / Computer crimes / Military science / Stuxnet / Duqu / United States Cyber Command / Cyber / Malware / Cyberwarfare / War / Electronic warfare

Cyber warfare threat rapidly increasing: Experts

Add to Reading List

Source URL: labrisnetworks.com

Language: English - Date: 2015-03-02 03:06:26
314Cyberterrorism / Hacking / Cyberspace / Electronic warfare / Military technology / Ross Babbage / Cyberwarfare / Computer crimes / Terrorism

Satellite in earths atmosphere

Add to Reading List

Source URL: www.kokodafoundation.org

Language: English - Date: 2011-02-03 17:08:41
315Software / Computer security / Electronic warfare / Computer network security / Software testing / Qualys / Malware / Vulnerability / Attack / Computing / Cyberwarfare / Hacking

Document Malware Attacks Presented by Roland Cheung HKCERT HKCERT - Information Security Seminar (March)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2010-11-13 10:13:08
316Computer network security / Electronic warfare / Hacking / Military technology / Cyberwarfare / Computer security / Security / FireEye /  Inc.

Study From FireEye and Mandiant Reveals Legacy Cybersecurity Products Failed to Protect 97% of Organizations Using Them Analysis of Real-World Deployments Uncovers Critical Flaws in Most Cyber Defense Architectures Not U

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2014-10-23 00:12:45
317Security / Electronic warfare / Hacking / Military technology / Cyberwarfare / Risk / International Multilateral Partnership Against Cyber Threats / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Actuarial science / Ethics / Management

CYBERSECURITY RISK RESEARCH CENTRE http://www.riskgroupllc.com http://www.riskgroupllc.com

Add to Reading List

Source URL: www.riskgroupllc.com

Language: English - Date: 2015-03-08 23:41:35
318Cyberwarfare / Computer crimes / Computer security / Electronic warfare / Hacker / Attack / Phishing / Zone-H / Defacement / Cybercrime / Hacking / Computing

Protecting Your Corporation from Hacking Attacks Presented by Roland Cheung HKCERT Information Security Seminar[removed]May) - Combat Cyber Attack

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-10-26 00:41:59
319Software / Computer security / Electronic warfare / Computer network security / Software testing / Qualys / Malware / Vulnerability / Attack / Computing / Cyberwarfare / Hacking

Document Malware Attacks Presented by Roland Cheung HKCERT HKCERT - Information Security Seminar (March)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2010-11-13 10:14:27
320National security / Electronic warfare / Hacking / Computer crimes / Military technology / United States Cyber Command / Cyber spying / Industrial espionage / Information Warfare Monitor / Cyberwarfare / Cybercrime / Espionage

Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute MacArthur Asia Security Project Executive summary Cyber infrastructure is critical to the global economy. Yet

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-03-07 12:35:38
UPDATE