Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 142 results for Threat

Brochure | May 2018 - Brochure SEI Education and Training Catalog

This catalog describes SEI training and certificates that help you tackle today's software, systems, and cybersecurity challenges.

Podcast | December 2017 - Podcast 5 Best Practices for Preventing and Responding to Insider ... By Randall F. Trzeciak

Randy Trzeciak, technical manager of the CERT National Insider Threat Center, discusses five best practices for preventing and responding to insider threat.

Presentation | December 2017 - Presentation Model-Driven Insider Threat Control Selection and ... By Randall F. Trzeciak, Daniel L. Costa

This presentation discusses how organizations can identify, prioritize, and select appropriate security controls.

Podcast | November 2017 - Podcast Positive Incentives for Reducing Insider Threat By Andrew P. Moore, Daniel Bauer

Andrew Moore and Daniel Bauer highlight results from our recent research that suggests organizations need to take a more holistic approach to mitigating insider threat.

Brochure | November 2017 - Brochure CERT Insider Threat Center By CERT Insider Threat Center

This booklet describes the CERT Insider Threat Center's purpose, products, and services, including assessments, workshops, courses, and certificate programs.

Presentation | October 2017 - Presentation Technical Detection of Intended Violence against Self or ... By Tracy Cassidy

Presentation on research to use insider threat tools to detect indicators of employees who are may be on a path to harm themselves and/or others within the workplace

Poster | October 2017 - Poster Technical Detection of Intended Violence Against Self or ... By Tracy Cassidy

Poster on research into determining the extent to which it is possible to technically detect indicators of employees who may be on a path to harm themselves and/or others within the workplace via insider threat detection tools

Technical Report | October 2017 - Technical Report 2017 Emerging Technology Domains Risk Survey By Dan J. Klinedinst, Joel Land, Kyle O'Meara

This report describes our understanding of future technologies and helps US-CERT identify vulnerabilities, promote security practices, and understand vulnerability risk.

2007 E-Crime Watch Survey

Results of the 2007 E-Crime Watch Survey reveal that while security events and electronic crimes were steady, there are concerns that security executives may be becoming over confident.

2006 E-Crime Watch Survey News Item

The 2006 E-Crime Watch Survey indicates that while there has been a decline in security events, there has been an increase in the financial and operational losses caused by such incidents.

Refine