Home cyber
 

Keywords :   


Tag: cyber

U.S. charges Chinese Army members with cyber espionage

2014-05-19 19:59:11| InfoWorld: Top News

Tags: members chinese charges army

 

Cyber Security Threats: Watch Out for Watering Holes

2014-05-15 21:08:00| Chemical Processing

Process engineer learns the right way to guard against vulnerability.

Tags: security watch cyber holes

 
 

Network Cyber Security System uses bio-inspired technology.

2014-05-08 14:30:30| Industrial Newsroom - All News for Today

Using bio-inspired technology that mimics and applies autonomic fight-or-flight fear response mechanism of mammals to cyber defense, Perception™ provides neural network architecture designed to combat unknown and emerging threats. Network security system, while able to identify malicious activity and new attacks as they emerge, can also monitor for and detect any slow, unauthorized data exfiltration — even when obfuscation techniques are used to evade rules-based detection techniques. This story is related to the following:Anti-Virus Software |

Tags: system technology network security

 

Hard Rock PI cyber test

2014-05-06 15:43:20| Oil IT Journal - www.oilit.com

To secure your processes, go back to school, deploy Microsoft SCM 3.0, checkout Metasploit and test in the cloud. OSIsoft reports results of cyber security challenge at 2014 User Conference.

Tags: hard test rock cyber

 

Cyber security round-up

2014-05-06 15:43:20| Oil IT Journal - www.oilit.com

Computer Sciences Corp., Siemens, McAfee, Ernst and amp;Young, Iaitam, Industrial Defender. and nbsp;

Tags: security cyber roundup cyber security

 

Sites : [84] [85] [86] [87] [88] [89] [90] [91] [92] [93] [94] [95] [96] [97] [98] [99] [100] [101] [102] [103] next »