Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This report explains the menu of actions for defending an organization against cyberattack and recommends an approach for organizing the range of actions and evaluating cybersecurity defensive activities.
This report, the second in a series, reveals insights from chief information security officers; examines network defense measures and attacker-created countermeasures; and explores software vulnerabilities and inherent weaknesses.
The Internet is a new battleground between governments that censor online content and those who advocate Internet freedom. This report examines the implications of Internet freedom for state-society relations in nondemocratic regimes.
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) which combines something you know (e.g., a PIN), something you have (e.g., a token), and/or something you are (e.g., a fingerprint) is increasingly being required. This report investigates why organizations choose to adopt or not adopt MFA and where they choose to use it.
Develops a framework for assessing classification decisions and uses it to conclude that classifying the Global Force Management Data Initiative provides little value (but still advises monitoring file contents).
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.