Works matching IS 19490550 AND DT 2018 AND VI 16 AND IP 2
Results: 10
The Post Exploitation Malware Era.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 35
- By:
- Publication type:
- Article
Legal Requirements of Notification of Breaches: An Overview.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 29
- By:
- Publication type:
- Article
CPU Bugs: Trading Security for Performance: Exploring the causes and long-term impact from the infamous Meltdown and Spectre vulnerabilities.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 25
- By:
- Publication type:
- Article
Security Incidents and Breaches in the Healthcare Industry: A Case Study in the Lack of Federal and State Coordination.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 20
- By:
- Publication type:
- Article
The Two Faces of Innovation: From Safe and Dumb to Vulnerable and Smart Products and Infrastructure.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 14
- By:
- Publication type:
- Article
Encryption vs. Tokenization.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 10
- By:
- Publication type:
- Article
GDPR - What Does It Mean for Infosec?
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 8
- By:
- Publication type:
- Article
Managing Cybersecurity Risk in the Age of "Smart" Everything.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 7
- By:
- Publication type:
- Article
GDPRidiculous!
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 6
- By:
- Publication type:
- Article
Answer: May 25, 2018.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 5
- By:
- Publication type:
- Article