Extensible Threat Management

Results: 9



#Item
1BIOS / Boot loaders / Booting / Unified Extensible Firmware Interface / Advanced Configuration and Power Interface / Rootkit / System Management Mode / S3 / Reboot / Unified EFI Forum / Coreboot

Advanced Threat Research Technical Details of the S3 Resume Boot Script Vulnerability Revision 1 July 2015

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2015-07-29 16:06:16
2Technology / Computing / Unified threat management / Telecommunications engineering / WatchGuard / Network security / Wireless / Managed security service / Computer network security / Technical terminology / Extensible Threat Management

Microsoft Word - WatchGuard

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2014-10-23 00:03:41
3Technology / Computing / Unified threat management / Telecommunications engineering / WatchGuard / Network security / Wireless / Managed security service / Computer network security / Technical terminology / Extensible Threat Management

Microsoft Word - WatchGuard

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2014-10-23 00:12:58
4Internet protocols / Cryptographic protocols / Data / Computer network security / Technical terminology / Extensible Threat Management / FIPS 140 / HMAC / Transport Layer Security / Computing / Cryptography / Cryptography standards

FIPS[removed]Security Policy for WatchGuard XTM XTM 850, XTM 860, XTM 870, XTM 870-F XTM 1520, XTM 1525

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 15:05:01
5Technology / Computing / Unified threat management / Telecommunications engineering / WatchGuard / Network security / Wireless / Managed security service / Computer network security / Technical terminology / Extensible Threat Management

Microsoft Word - WatchGuard

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:32
6Internet protocols / Cryptographic protocols / Data / Computer network security / Technical terminology / Extensible Threat Management / FIPS 140 / HMAC / Transport Layer Security / Computing / Cryptography / Cryptography standards

Security Policy XTM - V2.1.2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-17 15:39:18
7Cyberwarfare / System software / Unified Extensible Firmware Interface / System Management Mode / Personal computer hardware / Threat model / Threat / Advanced Configuration and Power Interface / Asset / Computing / BIOS / Computer security

presented by Threat Modeling for Modern System Firmware Robert P Hale, Vincent Zimmer IntelĀ® Corp.

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 13:39:31
8Cyberwarfare / Unified Extensible Firmware Interface / Unified EFI Forum / System Management Mode / Vulnerability / Threat / Firmware / Privilege escalation / BIOS / Computing / Computer security

UEFI Firmware Security Best Practices Presented by: Dick Wilkins, PhD Principal Technology Liaison presented by

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2014-05-19 20:01:37
9Internet protocols / Cryptographic protocols / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / HMAC / Extensible Threat Management / Transport Layer Security / Cryptography / Computing / Cryptography standards

Security Policy XTM - V2.2.7

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-18 15:57:36
UPDATE