Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This report explains the menu of actions for defending an organization against cyberattack and recommends an approach for organizing the range of actions and evaluating cybersecurity defensive activities.
This report, the second in a series, reveals insights from chief information security officers; examines network defense measures and attacker-created countermeasures; and explores software vulnerabilities and inherent weaknesses.
The Internet is a new battleground between governments that censor online content and those who advocate Internet freedom. This report examines the implications of Internet freedom for state-society relations in nondemocratic regimes.
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) which combines something you know (e.g., a PIN), something you have (e.g., a token), and/or something you are (e.g., a fingerprint) is increasingly being required. This report investigates why organizations choose to adopt or not adopt MFA and where they choose to use it.
Develops a framework for assessing classification decisions and uses it to conclude that classifying the Global Force Management Data Initiative provides little value (but still advises monitoring file contents).
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.