Showing 1 - 10 of 126 results for the Publish Year - 2017
Watch Will Hayes in this Cyber Minute as he discusses using practices like continuous integration and a common code base, which help teams focus on getting the work done.
This report summarizes our understanding of future technologies. It helps US-CERT identify vulnerabilities, promote good security practices, and understand vulnerability risk.
This webinar will focus on the development and application of combined data analytics and will offer several examples of analytics that combine domain resolution data, network device inventory and configuration data.
Introduces a design framework for cyber warfare exercises. It ensures that in designing team-based exercises, realism is factored into every aspect of the participant experience.
With an ever increasing number of crimes with a cyber component, the need for investigators who have been trained the ways of the Internet, encryption, and social media, to name a few, is growing and will continue to grow.
This doctoral thesis, completed at Vrije Universiteit Amsterdam, focuses on software architecture practices for systems of systems, including data-intensive systems.
In this tutorial, SEI researchers describe auditing rules and a lexicon that SEI developed.
Describes the Cybersecurity Program Progress Metric and how its implementation in a large, diverse U.S. national organization can serve to indicate progress toward improving cybersecurity and resilience capabilities.
SHORT is a tool to simplify reasoning about requirements engineering (RE) models by exploiting key decisions within them, evaluated on eight complex RE models.
So what is risk appetite? It is the amount and type of risk that an organization is willing to accept. In other words, risk appetite specifies value ranges for key performance indicators.