8 research outputs found
Migrating to Zero Trust Architecture: Reviews and Challenges
- Author
- B. Osborn
- C. Page
- Cybersecurity & Infrastructure Security Agency
- FireEye
- H. King
- Information Security Media Group
- J. Peck
- Joint Task Force
- L. Cittadini
- L. Goodspeed
- OASIS
- OASIS
- OASIS Cyber Threat Intelligence (CTI)
- P. A. Grassi
- R. Ward
- S. Rose
- Square Enix
- T. Pandit
- The European Parliament and The Council of the European Union
- U.S. Department of Health & Human Services
- V. Escobedo
- Publication venue
- 'Hindawi Limited'
- Publication date
- Field of study
Cybersecurity and Cybercrime: Intellectual Property and Innovation
- Author
- Andrew F See
- Ashlee Vance
- Byron Akohido
- Cyber Pricewaterhousecooper
- E G See
- E G See
- E G See
- E G See
- E G See
- E G See
- E G See
- Emile Loza de Siles
- Inc Crowdstrike
- Jordan Robertson
- Katie Kuehner
- Madeleine Johnson
- Mike Lennon
- Nicole Perlroth
- See Adam Blackwell
- See Angela Ziegenhorn
- See Cisco Systems
- See Cybersecurity Unit
- See David Kinsinger
- See Emile Loza
- See Sarah Kuranda
- U S See
- U S The
- Publication venue
- 'Elsevier BV'
- Publication date
- 01/01/2015
- Field of study
A Separate Network for Control System CyberSecurity
- Author
- Behr P
- Broadbandnow.com
- Carnegie Mellon University
- CTIA
- ESCWG Roadmap to Achieve Energy Delivery Systems Cybersecurity
- Federal Communications Commission
- Hayden M
- Lobo B
- Olavsrud T
- ORNL
- SANS Industrial Control Systems and the Electricity-Information Sharing and Analysis Center
- Smart America
- U.S. Department of Energy (DOE)
- U.S. Department of Homeland Security
- U.S. Department of Homeland Security National Infrastructure Protection Plan (NIPP)
- U.S. DOE
- U.S. DOE and the Electric Power Research Institute
- U.S. DOE and US Department of Homeland Security
- Williams K Bennett C
- Publication venue
- 'BCS Learning and Development Limited'
- Publication date
- Field of study
Managing Cyberthreat
- Author
- Afroditi Papanastasiou
- C Matthew
- Cal L Rev
- Christina Parajon Skinner
- David E Sanger
- Denis Drouin
- Ellen Nakashima
- Eric Talbot Jensen
- Exec
- Id
- Id
- J Lawrence
- J Lawrence
- Jay P Id
- Jennifer Martinez
- John Moteff &
- Laurie R Blank
- Lawrence J Trautman
- Lawrence J. Trautman
- Michael N Schmitt
- Mitchell S See Generally
- Nathan Alexander Sales
- Oona A Hathaway
- P Jay
- P Jay
- Paul Stockton &
- Peter Sommer &
- Peter Swire
- Remus Titiriga
- Scott Shackelford
- Shackelford
- Stan L Pol&apos
- T Brian
- T P
- The Cybersecurity
- U L Nw
- U S See
- Publication venue
- 'Elsevier BV'
- Publication date
- 01/01/2014
- Field of study
Evolving Toward a Balanced Cyber Strategy in East Asia: Cyber Deterrence or Cooperation?
- Author
- Arquilla J.
- Bartos C. A.
- Booth K.
- Brodie B.
- Clarke R. A.
- Hathaway O. A.
- Japanese Government
- Japanese Government
- Jasper S.
- Jervis R.
- Korns S. W.
- Legislative Yuan
- Lewis J. A.
- Libicki M. C.
- Libicki M. C.
- Lieber K.
- Milevski L.
- Ministry of National Defense (MND)
- MND
- National Center of Incident Readiness and Strategy for Cybersecurity
- Office of the Director of National Intelligence
- Prime Minister’s Office
- Rid T.
- Snyder G. H.
- Snyder J. L.
- US DoD
- Publication venue
- 'World Scientific Pub Co Pte Lt'
- Publication date
- Field of study
Country-level cybersecurity posture assessment:Study and analysis of practices
- Author
- Australian Government
- Australian Government ASIC, KPMG, Deloitte, EY, Pwc.
- Cybersecurity Malaysia
- Department of Information and Communications Technology Republic of the Philippines
- Economist Intelligence Unit and Booz Allen Hamilton
- European Union Agency for Network and Information Security
- European Union Agency for Network and Information Security
- European Union Agency For Network And Information Security (ENISA)
- Federal Chancellery of the Republic of Austria
- Federal Office for Information Security (BSI)
- Government of Estonia
- Government of Finalnd
- Government of Kenya
- Government of the United Kingdom
- Hathaway M.
- Indian Computer Emergency Response Team (CERT-In)
- ISO/IEC
- ITU
- ITU
- ITU
- ITU ABI Reserach
- Ministry of Electronics and IT
- Ministry of Electronics and IT
- National Coordinator for Security and Counterterrorism (NCTV)
- National Institute of Standards and Technology (NIST)
- NATO Cooperative Cyber Defence Center of Excellence (CCDCOE)
- Potomac Institute for Policy Studies
- Setiadi F.
- Shannak R. O.
- Telecommunication Unit Government of barbados
- The National Cyber Security Centre (NCSC)
- United Nations
- United States Agency for International Development
- Voeller J. G.
- Publication venue
- 'Informa UK Limited'
- Publication date
- Field of study
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
- Author
- Acquisti
- Agrafiotis
- Anderson
- Anderson
- Anderson
- Andoh-Baidoo
- Ashley
- Beck
- Beck
- Brenner
- Campbell
- Cavusoglu
- Charles
- Dark Reading
- Edwards
- Elo
- ENISA
- Felici
- Gartzke
- Giddens
- Gizmodo
- Gratz
- Greenberg A. Hackers remotely killed a jeep on the highway- with me in it
- Greenfield
- Harvard Mental Health Letter
- Hess A. Inside the Sony hack
- Hovav
- Howard
- Hsieh
- Hutchins
- InfoSec Institute
- Infosec Institute
- ISACA
- JP Morgan Chase reveals massive data breach affecting 76m households
- JP Morgan security exec reassigned after breach
- Kannan
- Kesan
- Klahr
- Kleinig
- Krebs on Security
- Kshetri
- Kvochko
- Laube
- Lee T. Forget the Ashley Madison or Sony Hacks – a crippling cyberattack is imminent in the US
- Levi
- Lloyds of London
- McDaid L. Talktalk cyber-attack: county Londonderry man targeted
- Moore
- National Institute of Standards Technology
- New Zealand Government. Risk Assessment Process: Information Security
- Nguyen
- Oxford English Dictionary
- Paolo Passeri Hackmageddon
- Pemberton
- Punter
- PwC
- Schulhofer
- Sharpe
- Singapore personal data hack hits 1. 5m health authority says
- Sony seeking more cybersecurity staff amid hack
- Spalek
- Talktalk hackers go on £600 spending spree with stolen card details as boss says its too early to consider compensation
- Telang
- The Huffington Post
- The Parliament of the Commonwealth of Australia
- Titcomb J. Ukrainian blackout blamed on cyber-attack
- Top data security expert fears traumatic aftermath in Ashley Madison hack
- U. K. Government
- Uber concealed huge data breach
- UK Government and Marsh Ltd
- US Department of Homeland Security
- UVM
- Van Slyke
- Variety
- Veris Community
- White L. and Bergin T. Tesco says $3million stolen in cyber theft resumes service
- Why it pays to complain via Twitter
- Woods
- World Economic Forum
- Zou
- Çetin
- Publication venue
- 'Oxford University Press (OUP)'
- Publication date
- Field of study
Articulation, antagonism, and intercalation in Western military imaginaries
- Author
- Adas M
- Alberts DS
- Alger JI
- Arquilla J
- Arthur BW
- Arthur BW
- Arthur BW
- Barnett TPM
- Barry J
- Beinhocker ED
- Beinhocker ED
- Beinhocker ED
- Bendrath R
- Bousquet A
- Buzan B
- Cebrowski AK
- Cebrowski AK
- Cebrowski AK
- Cebrowski AK
- Cebrowski AK
- Clarke L
- CSIS Commission on Cybersecurity for the 44th Presidency
- DeCaro C
- DeLuca K
- DiMascio Jen
- Doyle R
- Eden L
- Fortun M
- Fuller JFC
- Fuller JFC
- Galison PL
- Gat A
- Gat A
- Gates RM
- Hacker BC
- Hammes TX
- Hirst P
- Jaffe G
- Krepinevich AF
- Krepinevich AF
- Laclau E
- Lawson S
- Liddell Hart BH
- Lind WS
- Lind WS
- Lind WS
- Marcus GE
- Marx L
- McConnell M
- Medhurst MJ
- Robb J
- Sherman WC
- Sieff M
- Szafranski R
- Toffler A
- Toffler A
- White House
- Publication venue
- 'SAGE Publications'
- Publication date
- Field of study