Information security management

Results: 13712



#Item
161Cyberwarfare / Computer security / Security / Computing / Cyber security standards / National Institute of Standards and Technology / Federal Information Security Management Act / Federal Information Processing Standards / National Cybersecurity Center of Excellence / Networking and Information Technology Research and Development

CYBERSECURITY ACTIVITIES AT NIST’S INFORMATION TECHNOLOGY LABORATORY HEARING BEFORE THE SUBCOMMITTEE ON TECHNOLOGY AND INNOVATION

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2016-05-06 11:29:44
162Computer security / Security / Cyberwarfare / Computer network security / Vulnerability / OpenVAS / Attack / Countermeasure / Security appliance / CVSS / Information security / Common Vulnerabilities and Exposures

Turn-key Vulnerability Management Greenbone Security Manager The solution for IT security in your organisation

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-19 11:06:48
163Computer security / Security / Prevention / Data security / Department of Defense Information Assurance Certification and Accreditation Process / Crime prevention / Cryptography / National security / Certified Information Systems Security Professional / Risk management framework / Information assurance / Vulnerability

Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-08-31 15:51:13
164System administration / Data security / Splunk / Computing / Information technology management / Information technology / Security operations center / Georgia Tech Research Institute / Cisco Systems / Professional certification

SOLUTION SHEET Big Data Analytics Making all Machine Data Accessible, Usable, Valuable WHY GTRI

Add to Reading List

Source URL: www.gtri.com

Language: English - Date: 2016-03-15 18:34:14
165Identity management / Data security / Law / Privacy / Neelie Kroes / Computing / Personal /  Inc. / Medical privacy / Information technology / Politics of the Netherlands / Fraunhofer Institute for Open Communication Systems

Exclusive panel on Identity Management, Privacy and Security Achieves Success at the World Economic Forum Meeting in Davos 2014 Geneva 28th January, 2014 – At the roundtable on Addressing Identity of People and Things,

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2014-01-30 13:49:03
166Cryptography / Key management / Public key infrastructure / Public-key cryptography / E-commerce / Computer security / Public key certificate / Conveyancing / Professional certification / Accreditation / Certificate authority / Information security

Electronic Conveyancing National Law (Victoria) Operating Requirements Determined by the Registrar of Titles Version 3

Add to Reading List

Source URL: www.dtpli.vic.gov.au

Language: English - Date: 2015-09-29 22:03:52
167Computing / Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Schematron / Federal Information Security Management Act / XML Schema / National Institute of Standards and Technology / Open Vulnerability and Assessment Language

NIST SP 800-126A, SCAP 1.3 Component Specification Version Updates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:17:50
168Computer security / Security / Prevention / Data security / Crime prevention / Cryptography / National security / Health Insurance Portability and Accountability Act / Information security / Vulnerability / Security management / Security controls

Security HIPAA Security Topics 1.

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2015-09-03 14:19:54
169Computing / Security / Information technology management / Computer network security / Computer security / Crime prevention / Cryptography / National security / Information security / Security appliance / Intrusion detection system / Firewall

Job Opening April 19, 2016 JOB TITLE: DEPT: System Security Administrator

Add to Reading List

Source URL: esd.ny.gov

Language: English - Date: 2016-04-19 12:12:44
170Security / Prevention / Information technology management / Computer security / Data security / Cryptography / National security / Information security / Security management / Asset / ISO/IEC 27001:2013 / ISO/IEC 27001:2005

Bit10 IT Security Policy 1. Introduction Bit10 develops web and mobile applications and provides hosting services for websites and servers. The importance of the data on these systems is of paramount importance to Bit10

Add to Reading List

Source URL: www.bit10.net

Language: English - Date: 2015-09-15 10:13:06
UPDATE