Overslaan en naar de inhoud gaan
A51
  • HOME
  • OVER A51
  • CTC
  • NEWS
  • REPORTS
  • NCSC ALERTS
  • BRICA
  • CONTACT

Whitepaper

Privacy leakage vs. Protection measures: the growing disconnect, Balachander Krishnamurthy - AT&T Labs Research; Konstantin Naryshkin - Worcester Polytechnic Institute; Craig E. Wills - Worcester Polytechnic Institute, May 2011 - pdf (180 kB)

Understanding the Modern DDoS Threat by Gunter Ollmann, VP of Research, Damballa, May 2011 - pdf (416 kB)

sites/default/files/pdf/SSRN_id1824228.pdf

Larsson, Stefan, The Path Dependence of European Copyright. SCRIPT-ed, Vol. 8, No. 1, April 15, 2011 - pdf (586 kB)

Mercatus Center at George Mason University: Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy, Jerry Brito & Tate Watkins, Apr 26, 2011 - pdf (380 kB)

DHS: Enabling Distributed Security in Cyberspace - Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action, March 23, 2011 - pdf (896 kB)

2009 BlackHat Conference USA: Fighting Russian Cybercrime Mobsters: Report from the Trenches - pdf (234 kB)

You Have No Sovereignty Where We Gather – Wikileaks and Freedom, Autonomy and Sovereignty in the Cloud, Balázs Bodó - Budapest University of Technology and Economics; Stanford Law School Center for Internet and Society, March 7, 2011 - pdf (761 kB)

CDT, U.S. Chamber of Commerce, Business Software Alliance, TechAmerica, and the Internet Security Alliance: Improving our Nation’s Cybersecurity through the Public-Private Partnership, March 8, 2011 - pdf (369 kB)

10 Conservative Principles for Cybersecurity Policy Paul Rosenzweig, George Washington University School of Law; The Heritage Foundation, February 10, 2011 - pdf (364 kB)

Paginering

  • Eerste pagina
  • Vorige pagina
  • …
  • Pagina 6
  • Pagina 7
  • Pagina 8
  • Pagina 9
  • Pagina 10
  • Pagina 11
  • Huidige pagina 12
  • Pagina 13
  • Pagina 14
  • Volgende pagina
  • Laatste pagina

Reports

Reports | Healthcare

Whitepaper

Intel

 

Reports

Fortra: Defending Against Look-Alike Domains: A Strategic Guide to Preventing Brand Impersonation, September 2025 - pdf (1.980 KB)
10-10-2025
UK Government: The UK's Modern Industrial Strategy, June 24, 2025 - pdf (13.403 KB)
21-07-2025
UK Government: The UK's Modern Industrial Strategy, June 24, 2025 - pdf (13.403 KB)
30-06-2025
>>

HealthCare Alerts

Field Safety Notices: 27 to 31 January 2025
04-02-2025
Pressure Monitoring Device Recall: Medtronic Neurosurgery Issues Correction for Becker and Exacta External Drainage and Monitoring Systems Due to Cracks And/Or Leaks in Stopcocks
04-02-2025
Cybersecurity Vulnerabilities with Certain Patient Monitors from Contec and Epsimed: FDA Safety Communication
31-01-2025
>>

Healthcare reports

Netwrix: 2024 Hybrid Security Trends Report | Additional Findings for the Healthcare Sector, January 2025 - pdf (912 KB)
24-01-2025
UK Health Security Agency: Health Equity for Health Security Strategy 2023 to 2026, December 2024 - pdf (1280 KB)
13-12-2024
Health-ISAC: Vulnerability Metrics and Reporting, November 2024 - pdf (2,337 KB)
23-11-2024
>>

Events

Trojan horse

IEEE Cipher's Calendar of Security and Privacy Related Events

>>

Footer-menu

  • Copyright © 2025
  • A51
  • HOME
  • OVER A51
  • CTC
  • NEWS
  • REPORTS
  • NCSC ALERTS
  • BRICA
  • CONTACT