National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
181Standards organizations / National Institute of Standards and Technology / Funding Opportunity Announcement / Computer security / Identity theft / Identity management / Grant / Crime / Government / Identity / Computer network security / National Strategy for Trusted Identities in Cyberspace

Amended Announcement of Federal Funding Opportunity for the NIST NSTIC Pilot Grant Program

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-02-24 14:26:46
182Security / Standards organizations / Government / National Institute of Standards and Technology / Funding Opportunity Announcement / Computer security / Identity theft / Identity management / Personally identifiable information / Identity / Computer network security / National Strategy for Trusted Identities in Cyberspace

Third Amended Annoucement of FFO for the NSTIC Pilot Grant Program

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-26 13:49:27
183Security / Computer crimes / Public safety / Comprehensive National Cybersecurity Initiative / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / United States Department of Homeland Security / National Strategy for Trusted Identities in Cyberspace / National Cyber Security Division / Cyberwarfare / Computer security / Computer network security

United States Government Accountability Office GAO Report to Congressional Requesters

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-09-29 08:44:56
184Identity / Identity theft / Internet privacy / Security / Privacy / Computer security / Password / Electronic business / Computer network security / National Strategy for Trusted Identities in Cyberspace / Ethics

National Strategy for Trusted Identities in Cyberspace Enhancing Online Choice, Efficiency, Security, and Privacy The NSTIC envisions that: Individuals and organizations utilize secure, efficient, easy-to-use, and intero

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-07-21 15:14:00
185Security / Public safety / Computer network security / National security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / National Strategy for Trusted Identities in Cyberspace / Comprehensive National Cybersecurity Initiative / Cyberspace / Cyberwarfare / United States Department of Homeland Security / Computer security

Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2011-12-07 17:21:22
186Computer security / Cryptography / Security / Identity theft / Digital credential / Internet privacy / Cyberspace / Identity management / Credential / Identity / Computer network security / National Strategy for Trusted Identities in Cyberspace

National Strategy for Trusted Identities in Cyberspace Michael Garcia NIST May 10, 2011 Safeguarding Health Info through HIPAA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-05-10 01:00:00
187Taxation in the United States / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internal Revenue Service / Social Security / Identity theft / Authentication / Identity management / Security / Identity / Computer security

PDF Document

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-07-09 16:19:47
188Computer crimes / Public safety / National security / Computer security / Cyber-security regulation / United States Department of Homeland Security / Information Technology Industry Council / International Multilateral Partnership Against Cyber Threats / National Strategy for Trusted Identities in Cyberspace / Cyberwarfare / Computer network security / Security

    August 18, 2011 Mr. Jon Boyens Senior Advisor

Add to Reading List

Source URL: www.itic.org

Language: English - Date: 2013-09-03 13:19:45
189Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: democrats.science.house.gov

Language: English - Date: 2014-03-06 09:21:03
190Cyberpunk / Contemporary history / Cyberwarfare / Computing / Computer network security / National Strategy for Trusted Identities in Cyberspace / Cyberspace

MyData and the Identity Conundrum

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-07-11 15:22:49
UPDATE