Showing 1 - 10 of 88 results for the Publish Year - 2013 , Type - White Paper
This paper discusses how you can use the Smart Grid Maturity Model (SGMM) to benefit your utility clients.
In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
In this paper, the authors explore how effective communication might be improved by the development of a mental model internalized by the group's technical staff prior to an incident.
In this white paper, the authors map eight CERT tools, services, and processes to Microsoft's Simplified Security Development Lifecycle.
In this paper, the authors highlight efforts underway to address our society's growing dependence on software and the need for effective software assurance.
This paper explains the history of how the CERT-RMM came to be.
This paper summarizes the current posture of the cyber workforce and several initiatives designed to strengthen, grow, and retain cybersecurity professionals.
In this paper, the authors describe two efforts that support national cybersecurity education goals.
In this paper, Nancy Mead describes a measurement approach to security requirements engineering to analyze projects that were developed with and without SQUARE.