nist

Iranian-American U.S. Treasury official on Cyber Security Framework

Cyrus Amir-Mokri explain at SIMFA seminar U.S.

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today.

While surviving the need of wanting to harm with malicious software, for example in the development of cyber weapons, the current trend is to develop agents that serve primarily to the function of spying.

The Technical Specification for the Security Content Automation Protocol (SCAP)

Security products and checklist authors assemble content from SCAP data repositories to create vi