Showing 1 - 10 of 63 results for the Type - Article
This article lists resources that developers, architects, and security practitioners can use to build security into software during its development.
The article discusses what can (and should) be done to improve the state of software engineering on large scale aerospace programs.
In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.
In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.
In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.
In this paper, the authors analyze how the dynamics of compliance games illuminate the effectiveness or risks of an organizational policy.
In this paper, the authors present a system dynamics model that incorporates psychological factors to simulate the pathway to insider attack.
In this teQ Magazine article, Greg Porter discusses the role technology plays in solving today's cybersecurity challenges.
In this teQ Magazine article, Chris May discusses how the cybersecurity workforce shortage hampers our ability to deal with cyberattacks and data breaches.
In this teQ Magazine article, Matt Butkovic discusses the role process plays solving today's cybersecurity challenges.