Showing 21 - 30 of 488 results for the Type - White Paper
This white paper discusses the issues and decisions organizations should address when planning, implementing, and building a CSIRT.
In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.
The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, and technical debt.
This paper describes the Systems and Software Producibility Collaboration Environment (SPRUCE) project and the resulting recommended practices on five software topics.
This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
This paper identifies steps that organizations can use to enhance their security posture to detect potential insider threats.
Writing a great session proposal for a conference is difficult. Here are seven tips for writing a session proposal that will make reviewers go from frown to smile.
he goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field.
In this paper, the authors explore how effective communication might be improved by the development of a mental model internalized by the group's technical staff prior to an incident.