Property | Value |
rdfs:label | |
is dcterms:subject of | - Start with Security: A Guide for Business
- Cyber Incident Management Planning Guide
- Federal Information Management Security Act: Annual Report to Congress
- OECD Digital Economy Outlook 2015
- United States Coast Guard Cyber Strategy
- Fox Broadcasting v. Dish Network
- Ransomware on the Rise: FBI and Partners Working to Combat This Cyber Threat
- 2015 Data Breach Investigations Report
- Threat Landscape and Good Practice Guide for Software Defined Networks/5G
- Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff
- Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions
- A Review of the U.S. Navy Cyber Defense Capabilities: Abbreviated Version of a Classified Report
- ACSC 2015 Threat Report
- Criminals Continue to Defraud and Extort Funds from Victims Using CryptoWall Ransomware Schemes
- Cybersecurity: Authoritative Reports and Resources, by Topic
- Cybersecurity Issues for the Bulk Power System
- Keystones to Foster Inclusive Knowledge Societies; Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet
- Report on Cybersecurity Practices
- Strengthening our Nation's Cyber Defenses
- Quadrennial Technology Review
- Cyber Operations in DOD Policy and Plans: Issues for Congress
- Insecurity in the Internet of Things (IoT)
- Executive Order B-34-15
- The European Agenda on Security
- Responsibilities of Third-Party Service Providers under FERPA
- Framework for Cyber-Physical Systems
- Internet of Things Poses Opportunities for Cyber Crime
- NISTIR 8053
- 3D Printing: Opportunities, Challenges, and Policy Implications of Additive Manufacturing
- Bulk Collection of Signals Intelligence: Technical Options
- Cybersecurity Risk Management and Best Practices (WG4): Final Report
- The Internet of Things: Frequently Asked Questions
- Research Roadmap for Smart Fire Fighting
- Make or Break: The UK's Digital Future
- BCP's Office of Technology Research and Investigation: The next generation in consumer protection
- Executive Order 13694: Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities
- Industrial Internet of Things: Unleashing the Potential of Connected Products and Services
- Strategies for Improving the U.S. Payment System
- Best Practices for Victim Response and Reporting of Cyber Incidents
- CONNECTing the Dots: Options for Future Action
- CIS Controls for Effective Cyber Defense Version 6.0
- Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk
- Cybersecurity: Actions Needed to Address Challenges Facing Federal Systems
- NISTIR 7904
- Virtual Currencies
- Open Internet Order
- Facial Recognition Technology: Commercial Uses, Privacy Issues, and Applicable Federal Law
- Prosecuting Intellectual Property Crimes
- Cybersecurity Guidance
- Internet Management: Structured Evaluation Could Help Assess Proposed Transition of Key Domain Name and Other Technical Functions
- Transmission Operations Reliability Standards and Interconnection Reliability Operations and Coordination Reliability Standards
- Careful Connections: Building Security in the Internet of Things
- Notice of Inquiry: Mass Digitization Pilot Program
- ​Best Practices Guide for DoD Cloud Mission Owners
- Promoting Private Sector Cybersecurity Information Sharing
- NIST Special Publication 800-70
- NIST Special Publication SP 800-171
- Orphan Works and Mass Digitization: A Report of the Register of Copyrights
- NIST Special Publication 800-82
- Integrated DoD Intelligence Priorities
- NISTIR 8080
- A Digital Single Market Strategy for Europe
- Cybersecurity Best Practices Guide
- Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications
- Defense Additive Manufacturing: DOD Needs to Systematically Track Department-wide 3D Printing Efforts
- Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum
- FACT SHEET: Enhancing and Strengthening the Federal Government's Cybersecurity
- Enforcement Policy Statement on Deceptively Formatted Advertisements
- Actions to Strengthen Cybersecurity and Protect Critical IT Systems
- Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data
- E-mail Account Compromise
- Policy Implications of the Internet of Things
- CNSSI No. 4009
- TeslaCrypt
- DMCA Notice-and-Takedown Processes: List of Good, Bad, and Situational Practices
- IoTivity
- Worldwide Threat Assessment of the U.S. Intelligence Community
- Executive Order 13702
- Killing by Machine: Key Issues for Understanding Meaningful Human Control
- Guidance Update No. 2015-02
- Protection of Digital Computer and Communication Systems and Network
- NIST Special Publication 800-176
- Medical Devices Data Systems, Medical Image Storage Devices, and Medical Image Communications Devices
- GPS: Actions Needed to Address Ground System Development Problems and User Equipment Production Readiness
- Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems
- ARSC Guide to Audio Preservation
- Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen
- GAO Reports - 2015
- DoD Cloud Computing Security Requirements Guide
- Rosen v. eBay
- Cyber Threat Intelligence Integration Center
- 2015 National Security Strategy
- Copyright and the Music Marketplace
- Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry
- Maritime Critical Infrastructure Protection: DHS Needs to Better Address Port Cybersecurity
- Big Data and Differential Pricing
- Cybersecurity: Bank and Other Depository Regulators Need Better Data Analytics and Depository Institutions Want More Usable Threat Information
- CRS Reports - 2015
- Royal Canadian Mounted Police Cybercrime Strategy
- Autonomous Weapons Systems: A Brief Survey of Developmental, Operational, Legal, and Ethical Issues
- 2014 Global Threat Intel Report
- Cyber Security Growth Centre
|