Operations security

Results: 5095



#Item
141Network management / Computer security / Data security / System administration / Computer systems / SolarWinds / Security information and event management / Log management / Information security operations center / User Activity Monitoring / TriGeo Network Security

CTA_Free_Trial_Button_Green

Add to Reading List

Source URL: cdn.swcdn.net

Language: English - Date: 2015-10-20 12:51:43
142Computing / Security engineering / Computer security / Security / Computer network security / Sqrrl / Threat / Cyberwarfare / Cybercrime / E-commerce / Big data / Information security operations center

DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-02-15 14:44:42
143

DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-02-15 14:44:42
    144

    RSA DISTRIBUTED CREDENTIAL PROTECTION There is a security weakness lurking in many of today’s best designed systems – a primary point of compromise. Think about your own IT operations. Chances are that by breaching j

    Add to Reading List

    Source URL: www.emc.com

    Language: English
      145

      Acceleration Benchmarks for Agreement on Movement and Access as well as on the Gaza Security Situation AMA Goals: Goal: To ensure normalization of the RCP and KSCP operations, according to international standards and sub

      Add to Reading List

      Source URL: www.bitterlemons.org

      Language: English - Date: 2007-05-14 10:13:03
        146United Nations peacekeeping / Military operations other than war / Peacekeeping / United Nations Security Council / Department of Peacekeeping Operations / United Nations

        Fact Sheet on Sexual Exploitation and Abuse The United Nations expects that all peacekeeping personnel, military, police or civilian, adhere to the highest standards of behaviour and conduct themselves in a professional

        Add to Reading List

        Source URL: www.un.org

        Language: English - Date: 2015-09-09 12:17:21
        147

        Capabilities Statement Cyber Security Products Supporting Full-Spectrum Operations Pwnie Express delivers breadth of coverage, taking

        Add to Reading List

        Source URL: www.pwnieexpress.com

        Language: English - Date: 2014-06-25 11:29:21
          148Prevention / Computer security / Safety / Security / CIO magazine / Documentation / Information security / Chief information officer

          A. Requestor Role The Business Owner / System Owner / Document Requestor Role is: 1. Go to the Montana Operations Manual website at: http://sitsd.mt.gov/Governance/IT-Policies or http://doa.mine.mt.gov/policies/default

          Add to Reading List

          Source URL: sitsd.mt.gov

          Language: English - Date: 2015-08-12 17:03:41
          149

          WHY ATTEND All Things Open 2015? For Front-End and Back-End Developers, DevOps and Cloud specialists, Operations specialists (Engineers, Architects, Scientists, Database & Sys Admins), Security specialists, those in the

          Add to Reading List

          Source URL: allthingsopen.org

          Language: English - Date: 2015-09-01 09:20:55
            150

            WSIM: A software platform to simulate all-optical security operations Antonis Krithinakis∗ , Lubomir Stroetmann∗† , Elias Athanasopoulos∗ , Georgios Kopidakis∗ , and Evangelos P. Markatos∗ , ∗ Institute

            Add to Reading List

            Source URL: users.ics.forth.gr

            Language: English - Date: 2010-11-23 05:43:51
              UPDATE