This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws
Topics: Insider Threat
In this paper, the authors analyze how the dynamics of compliance games illuminate the effectiveness or risks of an organizational policy.
Jose Morales discusses mobile device security enhancements with defensive and offensive uses.
In this paper, the authors propose to improve how security requirements are identified.
In this article, the authors propose to enhance software development lifecycle models by implementing a process for including use cases based on previous cyberattacks.