homeland

Results 1 - 10 of 10Sort Results By: Published Date | Title | Company Name
By: GE Power     Published Date: Jan 31, 2017
Donít wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : cyber security power plants, utilities, power producers, power plant cyber attacks, power grids, power industry, power plant software, us homeland security
     GE Power
By: QTS     Published Date: Feb 04, 2016
An FCW Digital Dialogue Download this Digital Dialogue from Federal Computer Week to learn how agencies like the General Services Administration and Department of Homeland Security are using the cloud to extend their enterprise and foster innovation.
Tags : cloud computing, fcw, qts, carahsoft, vmware
     QTS
By: GE Power     Published Date: Jan 27, 2017
Donít wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry
     GE Power
By: CheckMarx     Published Date: Apr 03, 2019
Following a paper released by the US Department of Homeland Security, software security is fundamentally a software engineering issue that must be addressed systematically throughout the software development lifecycle.
Tags : 
     CheckMarx
By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards
Tags : entrust, homeland security, frac, identification standards, first responder, security, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
Learn which solutions help agencies comply with U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) standards.
Tags : identity, authentication, first responders, u.s. homeland security, frac
     Entrust Datacard
By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
     Coverity, Inc.
By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
     DoubleTake
By: SOCRATIQ Intelligence Systems     Published Date: Feb 14, 2007
This White Paper discusses how intelligence agency management can apply machine translation as a much-needed support tool that can make linguists and intelligence analysts more effective in producing meaningful and actionable results.
Tags : translation, terrorists, homeland security, language, socratiq, voice recognition, business management, cia
     SOCRATIQ Intelligence Systems
By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers
     HP - Enterprise
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com