Security Technical Implementation Guide

Results: 43



#Item
11Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Datasheet Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2015-04-26 02:19:47
12Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2006-04-11 15:56:22
13Computing / Evaluation / Host Based Security System / Security Technical Implementation Guide / Certification and Accreditation / Information assurance / EMASS / DOD Information Assurance Certification and Accreditation Program / Computer security / United States Department of Defense / Department of Defense Information Assurance Certification and Accreditation Process

Senior Network Security Officer (Security Specialist 3) Title: Location: Reports to:

Add to Reading List

Source URL: ealliant.com

Language: English - Date: 2012-09-17 01:03:21
14Security Technical Implementation Guide / Common Criteria / National Information Assurance Partnership / VBScript / Information technology management / Computer security / Computing / Configuration management

UNCLASSIFIED DoD Annex for the Web Browser Protection Profile

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-05-20 08:31:00
15Information technology management / Department of Defense Information Assurance Certification and Accreditation Process / Security controls / Database security / Information assurance / Risk management framework / Computer security / Security Technical Implementation Guide / Security

ELC 2015 Security Architecture in the IoT Age Stephen L Arnold Principal Scientist, VCT Labs Gentoo Linux Developer,

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-03-16 19:46:19
16Security Content Automation Protocol / Federal Information Security Management Act / National Institute of Standards and Technology / Information security / NIST Special Publication 800-53 / Security Technical Implementation Guide / Computer security / Security / Computing

National Checklist Program for IT Products

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-26 12:36:42
17Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Information technology management / Cyberwarfare / Computer security / Security / Configuration management

Security Advisor Cybernet Security Advisor Compliance in minutes… Not days… Cybersecurity/Information Assurance compliance regulations are confusing and time consuming to apply. It can take days per system for an ave

Add to Reading List

Source URL: cybersecurity.cybernet.com

Language: English - Date: 2015-03-31 10:56:29
18National security / CACI / Public safety / Security Technical Implementation Guide / Risk management framework / Certification and Accreditation / Defense Information Systems Agency / Department of Defense Information Assurance Certification and Accreditation Process / Information security / Security / Computer security / Crime prevention

CACI Information Solutions and Services CACI Automated Assessment & Authorization (A&A) Solutions Innovating to Keep Pace With Federal Cybersecurity Standards

Add to Reading List

Source URL: www.caci.com

Language: English - Date: 2015-04-01 15:52:10
19Federal Information Security Management Act / Security Technical Implementation Guide / Security Content Automation Protocol / Electronics / Law / National Vulnerability Database / Computer security / Computing / Federal Desktop Core Configuration

Federal Desktop Core Configuration (FDCC) FDCC Implementers Workshop January 24, 2008 NIST Computer Security Division

Add to Reading List

Source URL: nvd.nist.gov

Language: English
20Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 15:17:21
UPDATE