Showing 1 - 10 of 88 results for the Publish Year - 2013 , Type - White Paper
In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
In this paper, the authors explore how effective communication might be improved by the development of a mental model internalized by the group's technical staff prior to an incident.
In this white paper, the authors map eight CERT tools, services, and processes to Microsoft's Simplified Security Development Lifecycle.
In this paper, the authors highlight efforts to address the principles of software assurance and its educational curriculum.
This white paper was produced to focus attention on the opportunities and challenges for embedding information assurance considerations into Agile development and acquisition.
This paper summarizes the current posture of the cyber workforce and several initiatives designed to strengthen, grow, and retain cybersecurity professionals.
This paper explains the history of how the CERT-RMM came to be.
In this paper, Nancy Mead describes a measurement approach to security requirements engineering to analyze projects that were developed with and without SQUARE.
In this paper, the authors describe two efforts that support national cybersecurity education goals.