Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Computer security compromised by hardware failure (view), Computer security conference (view), Computer security incident management (view), Computer security model (view), Computer security policy (view), Computer security software (view), Vulnerability (computer security) (view), Exploit (computer security) (view), White hat (computer security) (view), Sandbox (computer security) (view), Full disclosure (computer security) (view), Black hat (computer security) (view), List of computer security certifications (view), Threat (computer security) (view), Logjam (computer security) (view), Blue team (computer security) (view), Shoulder surfing (computer security) (view), C-list (computer security) (view), Tom Cross (computer security) (view), Asset (computer security) (view)

searching for Computer security 216 found (3319 total)

alternate case: computer security

Impermium (225 words) [view diff] no match in snippet view article find links to article

Impermium was a cyber-security startup company based in Redwood City, California, which provided anti-spam and account protection services for Internet
RiskIQ (306 words) [view diff] no match in snippet view article find links to article
RiskIQ, Inc. was a cyber security company that was based in San Francisco, California. It provided cloud-based software as a service (SaaS) for organizations
Check Point (1,462 words) [view diff] no match in snippet view article find links to article
Check Point Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT security
Mandiant (1,345 words) [view diff] case mismatch in snippet view article find links to article
2016. Perlroth, Nicole; Sanger, David (January 2, 2014). "FireEye Computer Security Firm Acquires Mandiant". The New York Times. Archived from the original
Parrot OS (708 words) [view diff] no match in snippet view article find links to article
Parrot OS is a Linux distribution based on Debian with a focus on security, privacy, and development. Parrot is based on Debian's "stable" branch, with
Google hacking (838 words) [view diff] no match in snippet view article find links to article
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration
Federal Information Processing Standards (879 words) [view diff] exact match in snippet view article find links to article
and contractors. FIPS standards establish requirements for ensuring computer security and interoperability, and are intended for cases in which suitable
Internet police (1,012 words) [view diff] no match in snippet view article find links to article
Internet police is a generic term for police and government agencies, departments and other organizations in charge of policing the Internet in a number
Winlogon (1,050 words) [view diff] no match in snippet view article find links to article
Winlogon (Windows Logon) is the component of Microsoft Windows operating systems that is responsible for handling the secure attention sequence, loading
National Security Agency (24,653 words) [view diff] exact match in snippet view article find links to article
DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security
Employee monitoring software (795 words) [view diff] no match in snippet view article find links to article
Employee monitoring software, also known as bossware or tattleware, is a means of employee monitoring, and allows company administrators to monitor and
Hardware security module (1,539 words) [view diff] no match in snippet view article find links to article
A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), and performs encryption
Microsoft Digital Crimes Unit (1,242 words) [view diff] no match in snippet view article find links to article
The Microsoft Digital Crimes Unit (DCU) is a Microsoft sponsored team of international legal and internet security experts employing the latest tools and
IEEE 802.10 (182 words) [view diff] no match in snippet view article find links to article
IEEE 802.10 is a former standard for security functions that could be used in both local area networks and metropolitan area networks based on IEEE 802
Darktrace (1,260 words) [view diff] no match in snippet view article find links to article
Darktrace Holdings Ltd is a British cyber security company, established in 2013 and headquartered in Cambridge, United Kingdom with further global office
Null character (959 words) [view diff] no match in snippet view article find links to article
The null character (also null terminator) is a control character with the value zero. It is present in many character sets, including those defined by
Department of Telecommunications (523 words) [view diff] no match in snippet view article find links to article
The Department of Telecommunications, abbreviated to DoT, is a department of the Ministry of Communications of the executive branch of the Government of
L0pht (2,062 words) [view diff] case mismatch in snippet view article find links to article
famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’. The second character in its name was originally a
Secure file transfer program (91 words) [view diff] no match in snippet view article find links to article
sftp is a command-line interface client program to transfer files using the SSH File Transfer Protocol (SFTP), which runs inside the encrypted Secure Shell
SaferNet (185 words) [view diff] no match in snippet view article find links to article
SaferNet is a Brazilian non-governmental organization that combats Internet crime in partnership with the Federal Public Ministry. It facilitates anonymous
Google Security Operations (329 words) [view diff] no match in snippet view article find links to article
Google Security Operations (a.k.a. Google SecOps), formerly Google Chronicle Security Operations, is a cybersecurity company which is part of the Google
Google Security Operations (329 words) [view diff] no match in snippet view article find links to article
Google Security Operations (a.k.a. Google SecOps), formerly Google Chronicle Security Operations, is a cybersecurity company which is part of the Google
Port scanner (2,526 words) [view diff] case mismatch in snippet view article find links to article
SANS. Retrieved 2009-05-08. Cukier, Michel (2005). "Quantifying Computer Security" (PDF). University of Maryland. Archived from the original (PDF) on
Pluggable Authentication Module (421 words) [view diff] no match in snippet view article find links to article
A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming
S/MIME (1,501 words) [view diff] no match in snippet view article find links to article
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public-key encryption and signing of MIME data. S/MIME is on an IETF standards
CCNA (420 words) [view diff] no match in snippet view article find links to article
CCNA (Cisco Certified Network Associate) is an entry-level information technology (IT) certification offered by Cisco Systems. CCNA certification is widely
Ross J. Anderson (1,523 words) [view diff] exact match in snippet view article find links to article
and designed the stream cipher Pike. Anderson always campaigned for computer security to be studied in a wider social context. Many of his writings emphasised
Cryptographic primitive (819 words) [view diff] exact match in snippet view article find links to article
algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash
Kerio Technologies (658 words) [view diff] no match in snippet view article find links to article
Kerio Technologies, Inc. is a former technology company specializing in collaboration software and unified threat management for small and medium organizations
Linux PAM (314 words) [view diff] no match in snippet view article find links to article
Linux Pluggable Authentication Modules (PAM) is a suite of libraries that allow a Linux system administrator to configure methods to authenticate users
Intego (490 words) [view diff] no match in snippet view article find links to article
Intego is a Mac and Windows security software company founded in 1997 by Jean-Paul Florencio and Laurent Marteau. The company creates Internet security
Operation: Bot Roast (338 words) [view diff] no match in snippet view article find links to article
Operation: Bot Roast is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers through
Special Communications Service of Russia (553 words) [view diff] no match in snippet view article find links to article
The Special Communications and Information Service of the Federal Protective Service of the Russian Federation (Spetssvyaz, Spetssvyaz; Russian: Служба
Radia Perlman (2,486 words) [view diff] no match in snippet view article find links to article
Radia Joy Perlman (/ˈreɪdiə/; born December 18, 1951) is an American computer programmer and network engineer. She is a major figure in assembling the
BNC (software) (684 words) [view diff] no match in snippet view article
A BNC (short for Bounced Network Connection) is a piece of software that is used to relay traffic and connections in computer networks, much like a proxy
Sudo (1,760 words) [view diff] no match in snippet view article find links to article
sudo (/suːduː/) is a program for Unix-like computer operating systems that enables users to run programs with the security privileges of another user,
Scooby-Doo and the Cyber Chase (1,323 words) [view diff] no match in snippet view article find links to article
Scooby-Doo and the Cyber Chase is a 2001 American direct-to-video animated science fiction comedy mystery film, and the fourth in a series of direct-to-video
Lavasoft (974 words) [view diff] case mismatch in snippet view article find links to article
November 9, 2010. "Page 3 - Ad-Aware Pro Anniversary Edition Review: Computer Security Articles at". Brighthub.com. May 4, 2010. Retrieved November 9, 2010
Nessus (software) (161 words) [view diff] exact match in snippet view article
Computer security software
National Technical Research Organisation (1,560 words) [view diff] no match in snippet view article find links to article
The National Technical Research Organisation (NTRO) is a technical intelligence agency of India. It was set up in 2004. The agency reports to the National
Role-based access control (2,300 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563. Sandhu, R., Coyne, E.J., Feinstein, H.L. and
Runas (559 words) [view diff] no match in snippet view article find links to article
In computing, runas (a compound word, from “run as”) is a command in the Microsoft Windows line of operating systems that allows a user to run specific
Leonard Adleman (832 words) [view diff] no match in snippet view article find links to article
Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he received
SCSK (366 words) [view diff] no match in snippet view article find links to article
SCSK Corporation (株式会社SCSK, Kabushiki-gaisha Esu-Shī-Esu-Kei) is a Japanese information technology company headquartered in Tokyo, Japan, offering IT services
Computer forensics (2,409 words) [view diff] no match in snippet view article find links to article
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital
ISACA (1,052 words) [view diff] no match in snippet view article find links to article
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the Information
Great Cannon (612 words) [view diff] no match in snippet view article find links to article
The Great Cannon of China is an Internet attack tool that is used by the government of the People's Republic of China to launch distributed denial-of-service
Tiny Encryption Algorithm (1,189 words) [view diff] no match in snippet view article find links to article
In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines
Project Zero (1,496 words) [view diff] no match in snippet view article find links to article
Project Zero is a team of security analysts employed by Google tasked with finding zero-day vulnerabilities. It was announced on 15 July 2014. After finding
Doxing (4,346 words) [view diff] no match in snippet view article find links to article
Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet and
National Security Council (India) (1,276 words) [view diff] no match in snippet view article
The National Security Council (NSC) (IAST: Rāṣṭrīya Surakṣā Pariṣad) of India is an executive government body tasked with advising the prime Minister of
Fred Teeven (849 words) [view diff] no match in snippet view article find links to article
Fredrik "Fred" Teeven (born 5 August 1958) is a Dutch jurist, bus driver and former politician and prosecutor. A member of the People's Party for Freedom
IEC 60870-6 (1,896 words) [view diff] no match in snippet view article find links to article
IEC 60870 part 6 in electrical engineering and power system automation, is one of the IEC 60870 set of standards which define systems used for telecontrol
XTEA (1,012 words) [view diff] no match in snippet view article find links to article
In cryptography, XTEA (eXtended TEA) is a block cipher designed to correct weaknesses in TEA. The cipher's designers were David Wheeler and Roger Needham
Ralph Merkle (1,180 words) [view diff] no match in snippet view article find links to article
Ralph C. Merkle (born February 2, 1952) is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, the
Mitro (467 words) [view diff] no match in snippet view article find links to article
Mitro was a password manager for individuals and teams that securely saved users' logins, and allowed users to log in and share access. On October 6, 2015
ISC2 (1,020 words) [view diff] case mismatch in snippet view article find links to article
attendance included: Canadian Information Processing Society (CIPS) Computer Security Institute (CSI) Data Processing Management Association Special Interest
Ron Rivest (1,543 words) [view diff] no match in snippet view article find links to article
Ronald Linn Rivest (/rɪˈvɛst/; born May 6, 1947) is an American cryptographer and computer scientist whose work has spanned the fields of algorithms and
Mozilla Monitor (466 words) [view diff] no match in snippet view article find links to article
Mozilla Monitor, formerly known as Firefox Monitor, is an online data removal service developed by Mozilla, announced in June 2018, and launched on September
Andries Brouwer (621 words) [view diff] no match in snippet view article find links to article
Andries Evert Brouwer (born 1951) is a Dutch mathematician and computer programmer, Professor Emeritus at Eindhoven University of Technology (TU/e). He
Website defacement (539 words) [view diff] no match in snippet view article find links to article
Website defacement is an attack on a website that changes the visual appearance of a website or a web page. These are typically the work of hackers, who
Ron Rivest (1,543 words) [view diff] no match in snippet view article find links to article
Ronald Linn Rivest (/rɪˈvɛst/; born May 6, 1947) is an American cryptographer and computer scientist whose work has spanned the fields of algorithms and
Wardialing (831 words) [view diff] exact match in snippet view article find links to article
exploration, and crackers—malicious hackers who specialize in breaching computer security—for guessing user accounts (by capturing voicemail greetings), or
Narus Inc. (562 words) [view diff] no match in snippet view article find links to article
Narus Inc. was a software company and vendor of big data analytics for cybersecurity. In 1997, Ori Cohen, Vice President of Business and Technology Development
Mitro (467 words) [view diff] no match in snippet view article find links to article
Mitro was a password manager for individuals and teams that securely saved users' logins, and allowed users to log in and share access. On October 6, 2015
Scramdisk (210 words) [view diff] no match in snippet view article find links to article
Scramdisk is a free on-the-fly encryption program for Windows 95, Windows 98, and Windows Me. A non-free version was also available for Windows NT. The
Dasient (407 words) [view diff] no match in snippet view article find links to article
Dasient was an internet security company headquartered in Sunnyvale, California. It was founded in 2008 and launched its first product in June 2009. Dasient
Sentry 2020 (141 words) [view diff] no match in snippet view article find links to article
Sentry 2020 is a commercial software program for transparent disk encryption for PCs and PDAs using Microsoft Windows or Windows Mobile. It was developed
Trend Micro Internet Security (841 words) [view diff] no match in snippet view article find links to article
Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security program
Morgan Kaufmann Publishers (172 words) [view diff] exact match in snippet view article find links to article
graphics, multimedia information and systems, artificial intelligence, computer security, and software engineering. Morgan Kaufmann's audience includes the
Same-origin policy (2,182 words) [view diff] no match in snippet view article find links to article
In computing, the same-origin policy (SOP) is a concept in the web-app application security model. Under the policy, a web browser permits scripts contained
Robert Tappan Morris (1,442 words) [view diff] case mismatch in snippet view article find links to article
Multics and Unix; and later became the chief scientist at the National Computer Security Center, a division of the National Security Agency (NSA). Morris grew
Vba32 AntiVirus (255 words) [view diff] no match in snippet view article find links to article
VBA32 (Virus Block Ada 32) is antivirus software from the vendor VirusBlokAda for personal computers running Microsoft Windows. It detects and neutralizes
TCP reset attack (1,099 words) [view diff] exact match in snippet view article find links to article
Type of computer security exploit
Clickjacking (2,909 words) [view diff] no match in snippet view article find links to article
Clickjacking (classified as a user interface redress attack or UI redressing) is a malicious technique of tricking a user into clicking on something different
CrossCrypt (283 words) [view diff] no match in snippet view article find links to article
CrossCrypt is an open-source on-the-fly encryption program for the Microsoft Windows XP/2000 operating systems. CrossCrypt allows a user to make virtual
Cybersecurity and Infrastructure Security Agency (1,988 words) [view diff] no match in snippet view article find links to article
The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity
Vyatta (916 words) [view diff] no match in snippet view article find links to article
Vyatta is a software-based virtual router, virtual firewall and VPN product for Internet Protocol networks (IPv4 and IPv6). A free download of Vyatta has
Virus hoax (1,202 words) [view diff] no match in snippet view article find links to article
A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the
360 Total Security (418 words) [view diff] no match in snippet view article find links to article
360 Total Security, or its Chinese version, 360 Safeguard (Chinese: 360安全卫士), is an antivirus software developed by Beijing, China-based internet security
Michael Schroeder (469 words) [view diff] exact match in snippet view article find links to article
is an American computer scientist. His areas of research include computer security, distributed systems, and operating systems, and he is perhaps best
The Cuckoo's Egg (book) (1,122 words) [view diff] no match in snippet view article
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the
Netcraft (646 words) [view diff] no match in snippet view article find links to article
Netcraft is an Internet services company based in London, England. The company provides cybercrime disruption services across a range of industries. Netcraft
Snort (software) (441 words) [view diff] no match in snippet view article
Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and
Rop Gonggrijp (673 words) [view diff] exact match in snippet view article find links to article
[citation needed] After he left XS4ALL, Gonggrijp founded ITSX, a computer security evaluation company, which was bought by Madison Gurkha in 2006.[citation
Martin Hellman (1,554 words) [view diff] no match in snippet view article find links to article
Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his invention of public-key cryptography in
360 Total Security (418 words) [view diff] no match in snippet view article find links to article
360 Total Security, or its Chinese version, 360 Safeguard (Chinese: 360安全卫士), is an antivirus software developed by Beijing, China-based internet security
OWASP (1,634 words) [view diff] exact match in snippet view article find links to article
Computer security organization
WOT Services (1,277 words) [view diff] no match in snippet view article find links to article
WOT Services is the developer of MyWOT (also known as WOT and Web of Trust), an online reputation and Internet safety service which shows indicators of
National Security Operations Center (383 words) [view diff] no match in snippet view article find links to article
The National Security Operations Center (NSOC) or Directorate K is the part of the United States National Security Agency responsible for current operations
Utimaco Atalla (1,670 words) [view diff] case mismatch in snippet view article find links to article
National Institute of Standards and Technology. 28 October 2010. Computer Security Resource Center (3 December 2002). "FIPS 140-2 Security Requirements
Shatter attack (831 words) [view diff] no match in snippet view article find links to article
In computing, a shatter attack is a programming technique employed by hackers on Microsoft Windows operating systems to bypass security restrictions between
Cylance Pro Cycling (women's team) (319 words) [view diff] exact match in snippet view article
Tour, in 2016. The team's major sponsor, Cylance, was a high-tech computer security firm, and the team was owned by Inspire Sports whose founder, Omer
Splunk (3,957 words) [view diff] no match in snippet view article find links to article
Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated
Hard copy (562 words) [view diff] no match in snippet view article find links to article
In information handling, the U.S. Federal Standard 1037C (Glossary of Telecommunication Terms) defines a hard copy as a permanent reproduction, or copy
Tiger team (755 words) [view diff] case mismatch in snippet view article find links to article
approach to resolving vulnerability cases". Proc. 11th FIRST Conf. Computer Security Incident Handling and Response. Brisbane, Australia: CiteSeerX: 1–2
Wardriving (1,572 words) [view diff] no match in snippet view article find links to article
Wardriving is the act of searching for Wi-Fi wireless networks as well as cell towers, usually from a moving vehicle, using a laptop or smartphone. Software
Keycloak (498 words) [view diff] no match in snippet view article find links to article
Keycloak is an open-source software product to allow single sign-on with identity and access management aimed at modern applications and services. Until
Vincent Pilette (383 words) [view diff] no match in snippet view article find links to article
Vincent Pilette is an American businessman who is chief executive officer (CEO) of Gen Digital, a Fortune 500 company specializing in consumer cyber safety
Keycloak (498 words) [view diff] no match in snippet view article find links to article
Keycloak is an open-source software product to allow single sign-on with identity and access management aimed at modern applications and services. Until
Hector Martin (hacker) (826 words) [view diff] no match in snippet view article
Hector Martin Cantero (born September 9, 1990), also known as marcan, is a Spanish security hacker and former lead developer on the Asahi Linux project
Trusted Computing Group (596 words) [view diff] no match in snippet view article find links to article
The Trusted Computing Group is a group formed in 2003 as the successor to the Trusted Computing Platform Alliance which was previously formed in 1999 to
Firewall (film) (1,458 words) [view diff] no match in snippet view article
Firewall is a 2006 American action thriller film directed by Richard Loncraine and written by Joe Forte. The film stars Harrison Ford as a banker who is
Shatter attack (831 words) [view diff] no match in snippet view article find links to article
In computing, a shatter attack is a programming technique employed by hackers on Microsoft Windows operating systems to bypass security restrictions between
BusKill (1,044 words) [view diff] no match in snippet view article find links to article
BusKill is an open-source hardware and software project that designs computer kill cords to protect the confidentiality of the system's data from physical
Billboard hacking (1,122 words) [view diff] no match in snippet view article find links to article
Billboard hacking or billboard hijacking is the practice of altering a billboard without the consent of the owner. It may involve physically pasting new
Sourcefire (1,425 words) [view diff] exact match in snippet view article find links to article
American computer security company
Peter G. Neumann (536 words) [view diff] exact match in snippet view article find links to article
intrusion detection system known as IDES that was a model for later computer security software. Neumann has long served as moderator of RISKS Digest and
National Cybersecurity and Communications Integration Center (652 words) [view diff] no match in snippet view article find links to article
The National Cybersecurity and Communications Integration Center (NCCIC) is part of the Cybersecurity Division of the Cybersecurity and Infrastructure
SonicWall (977 words) [view diff] no match in snippet view article find links to article
SonicWall Inc. is an American cybersecurity company that sells a range of Internet appliances primarily directed at content control and network security
Dynamic linker (1,687 words) [view diff] no match in snippet view article find links to article
In computing, a dynamic linker is the part of an operating system that loads and links the shared libraries needed by an executable when it is executed
Incident management (1,628 words) [view diff] case mismatch in snippet view article find links to article
resources to treat the risk. Today, an important role is played by a Computer Security Incident Response Team (CSIRT), due to the rise of internet crime
Clifford Stoll (1,082 words) [view diff] no match in snippet view article find links to article
Clifford Paul "Cliff" Stoll (born June 4, 1950) is an American astronomer, author and teacher. He is best known for his investigation in 1986, while working
Cheetah Mobile (1,286 words) [view diff] no match in snippet view article find links to article
Cheetah Mobile Inc. (猎豹移动公司) is a Chinese mobile internet company incorporated in the Cayman Islands and headquartered in Beijing. Chen Rui (陈睿 current
Ben Laurie (487 words) [view diff] no match in snippet view article find links to article
Ben Laurie is an English software engineer. Laurie wrote Apache-SSL, the basis of most SSL-enabled versions of the Apache HTTP Server. He developed the
AVG Technologies (1,879 words) [view diff] no match in snippet view article find links to article
AVG Technologies B.V. is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developed
Need to know (831 words) [view diff] no match in snippet view article find links to article
The term "need to know" (alternatively spelled need-to-know), when used by governments and other organizations (particularly those related to military
Zeek (645 words) [view diff] no match in snippet view article find links to article
Free and open-source software portal Zeek is a free and open-source software network analysis framework. Vern Paxson began development work on Zeek in
ESET (2,511 words) [view diff] no match in snippet view article find links to article
ESET, s.r.o., is a software company specializing in cybersecurity, founded in 1992 in Bratislava, Slovakia. ESET's security products are made in Europe
OpenPAM (236 words) [view diff] no match in snippet view article find links to article
Free and open-source software portal OpenPAM is a BSD-licensed implementation of PAM used by FreeBSD, NetBSD, DragonFly BSD and macOS (starting with Snow
Dr.Web (649 words) [view diff] no match in snippet view article find links to article
Dr.Web is a software suite developed by Russian anti-malware company Doctor Web. First released in 1992, it became the first anti-virus service in Russia
Secureworks (1,290 words) [view diff] no match in snippet view article find links to article
Secureworks Inc. is an American cybersecurity company. The company has approximately 4,000 customers in more than 50 countries, ranging from Fortune 100
RSA Conference (1,494 words) [view diff] no match in snippet view article find links to article
The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991
StrongDM (331 words) [view diff] no match in snippet view article find links to article
StrongDM is an American technology company that develops an infrastructure access platform. In 2024 the company raised a $34,000,000 series C from Capital
The Tor Project (2,158 words) [view diff] no match in snippet view article find links to article
The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, Massachusetts. It is founded by computer scientists
WS-Security (1,441 words) [view diff] no match in snippet view article find links to article
Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services. It is a member of the Web service specifications and
Cheetah Mobile (1,286 words) [view diff] no match in snippet view article find links to article
Cheetah Mobile Inc. (猎豹移动公司) is a Chinese mobile internet company incorporated in the Cayman Islands and headquartered in Beijing. Chen Rui (陈睿 current
The Tor Project (2,158 words) [view diff] no match in snippet view article find links to article
The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, Massachusetts. It is founded by computer scientists
StrongDM (331 words) [view diff] no match in snippet view article find links to article
StrongDM is an American technology company that develops an infrastructure access platform. In 2024 the company raised a $34,000,000 series C from Capital
Golden Shield Project (3,376 words) [view diff] no match in snippet view article find links to article
The Golden Shield Project (Chinese: 金盾工程; pinyin: jīndùn gōngchéng), also named National Public Security Work Informational Project, is the Chinese nationwide
GoGuardian (1,352 words) [view diff] no match in snippet view article find links to article
GoGuardian is an educational software company founded in 2015 and based in Los Angeles, California. The company's services monitor student activity online
Canon IT Solutions (345 words) [view diff] no match in snippet view article find links to article
Canon IT Solutions Inc. (キヤノンITソリューションズ株式会社, Kyanon Ai-Tī Soryūshonzu Kabushiki-gaisha) is a Japanese company headquartered in Tokyo, Japan, that offers
Michael Burrows (computer scientist) (715 words) [view diff] no match in snippet view article
Michael Burrows, FRS (born 1963) is a British computer scientist and the creator of the Burrows–Wheeler transform, currently working for Google. Born in
ESET NOD32 (2,231 words) [view diff] no match in snippet view article find links to article
ESET NOD32 Antivirus, commonly known as NOD32, is an antivirus software package made by the Slovak company ESET. ESET NOD32 Antivirus is sold in two editions
Anti-keylogger (1,016 words) [view diff] no match in snippet view article find links to article
An anti-keylogger (or anti–keystroke logger) is a type of software specifically designed for the detection of keystroke logger software; often, such software
XXTEA (1,115 words) [view diff] no match in snippet view article find links to article
In cryptography, Corrected Block TEA (often referred to as XXTEA) is a block cipher designed to correct weaknesses in the original Block TEA. XXTEA is
ARP spoofing (1,558 words) [view diff] no match in snippet view article find links to article
In computer networking, ARP spoofing (also ARP cache poisoning or ARP poison routing) is a technique by which an attacker sends (spoofed) Address Resolution
Windows Live OneCare Safety Scanner (414 words) [view diff] exact match in snippet view article find links to article
provides a virus database, information about online threats, and general computer security documentation and tools. The virus scanner on the Windows Live OneCare
Proxy list (375 words) [view diff] no match in snippet view article find links to article
A proxy list is a list of open HTTP/HTTPS/SOCKS proxy servers all on one website. Proxies allow users to make indirect network connections to other computer
Cyber-security regulation (5,480 words) [view diff] case mismatch in snippet view article find links to article
are now held accountable for reporting major security incidents to Computer Security Incident Response Teams (CSIRT). While DSPs are not held to as stringent
Trishneet Arora (762 words) [view diff] no match in snippet view article find links to article
Trishneet Arora (born 2 November 1993) is an Indian cyber security professional who is the founder of TAC Security. TAC Security India's first pure-play
List of data-erasing software (184 words) [view diff] no match in snippet view article find links to article
This is a list of utilities for performing data erasure. "BleachBit Features". Retrieved 3 April 2016. "CCleaner Features". Retrieved 3 April 2016. "DBAN
Norton AntiBot (717 words) [view diff] no match in snippet view article find links to article
Norton AntiBot, developed by Symantec, monitored applications for damaging behavior. The application was designed to prevent computers from being hijacked
Dangling pointer (1,824 words) [view diff] no match in snippet view article find links to article
Dangling pointers and wild pointers in computer programming are pointers that do not point to a valid object of the appropriate type. These are special
Man-in-the-browser (1,867 words) [view diff] no match in snippet view article find links to article
Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser
CNIC (Pakistan) (1,731 words) [view diff] no match in snippet view article
The computerised national identity card (CNIC) (Urdu: قومی شناختی کارڈ, romanized: qaumī śanāxtī kārḍ) is an identity card with a 13-digit number available
Jtest (303 words) [view diff] no match in snippet view article find links to article
Jtest is an automated Java software testing and static analysis product developed by Parasoft. The product includes technology for data-flow analysis,
Vern Paxson (240 words) [view diff] no match in snippet view article find links to article
Vern Edward Paxson is a Professor of Computer Science at the University of California, Berkeley. He also leads the Networking and Security Group at the
ElcomSoft (594 words) [view diff] exact match in snippet view article find links to article
Since its establishment in 1990, the company has been working on computer security programs, with the main focus on password and system recovery software
Stakkato (385 words) [view diff] no match in snippet view article find links to article
Philip Gabriel Pettersson, known by the alias Stakkato, is a Swedish hacker and the alleged perpetrator of a worldwide cyber attack known to have occurred
List of data-erasing software (184 words) [view diff] no match in snippet view article find links to article
This is a list of utilities for performing data erasure. "BleachBit Features". Retrieved 3 April 2016. "CCleaner Features". Retrieved 3 April 2016. "DBAN
Dangling pointer (1,824 words) [view diff] no match in snippet view article find links to article
Dangling pointers and wild pointers in computer programming are pointers that do not point to a valid object of the appropriate type. These are special
CNIC (Pakistan) (1,731 words) [view diff] no match in snippet view article
The computerised national identity card (CNIC) (Urdu: قومی شناختی کارڈ, romanized: qaumī śanāxtī kārḍ) is an identity card with a 13-digit number available
John Draper (3,245 words) [view diff] exact match in snippet view article find links to article
former phone phreak. He is a widely known figure within the hacker and computer security community. He is primarily known as a colorful and unconventional
Xcitium (2,744 words) [view diff] exact match in snippet view article find links to article
the time of the event. For Comodo's lacking response on the issue computer security researcher Moxie Marlinspike called the whole event extremely embarrassing
F5, Inc. (2,156 words) [view diff] no match in snippet view article find links to article
F5, Inc. is an American technology company specializing in application security, multi-cloud management, online fraud prevention, application delivery
Man-in-the-browser (1,867 words) [view diff] no match in snippet view article find links to article
Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser
Gordon Lyon (444 words) [view diff] no match in snippet view article find links to article
Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) is an American network security expert, creator of Nmap and author of books, websites, and technical
The Hacker Crackdown (208 words) [view diff] no match in snippet view article find links to article
The Hacker Crackdown: Law and Disorder on the Electronic Frontier is a work of nonfiction by Bruce Sterling first published in 1992. The book discusses
ElcomSoft (594 words) [view diff] exact match in snippet view article find links to article
Since its establishment in 1990, the company has been working on computer security programs, with the main focus on password and system recovery software
NetIQ (551 words) [view diff] no match in snippet view article find links to article
NetIQ is a security software company. In 2023 it was acquired by OpenText. NetIQ was previously based in San Jose, California, with products that provide
Steve Gibson (computer programmer) (1,568 words) [view diff] no match in snippet view article
Steven M. Gibson (born March 26, 1955) is an American software engineer, security researcher, and IT security proponent. In the early 1980s, he worked
Integer overflow (3,206 words) [view diff] no match in snippet view article find links to article
In computer programming, an integer overflow occurs when an arithmetic operation on integers attempts to create a numeric value that is outside of the
Milw0rm (1,642 words) [view diff] exact match in snippet view article find links to article
seemed to be more interested in political purposes than exposing computer security flaws. It was also reported that milw0rm broke into a Turkish nuclear
Derek Atkins (113 words) [view diff] exact match in snippet view article find links to article
Derek A Atkins is a computer scientist specializing in computer security. He studied electrical engineering and computer science at the Massachusetts
Estonian Defence League's Cyber Unit (271 words) [view diff] no match in snippet view article find links to article
The Estonian Defence League’s Cyber Unit (Estonian: Küberkaitseliit, or KKL) is a group of units within certain malevs of the Estonian Defense League established
Mydoom (1,627 words) [view diff] exact match in snippet view article find links to article
online crime gangs. Mydoom was named by Craig Schmugar, an employee of computer security firm McAfee and one of the earliest discoverers of the worm. Schmugar
Norwegian Cyber Defence Force (122 words) [view diff] no match in snippet view article find links to article
The Norwegian Cyber Defence Force (Norwegian: Cyberforsvaret) is a branch of the Norwegian Armed Forces responsible for military communications and defensive
Factotum (software) (129 words) [view diff] no match in snippet view article
factotum is a password management and authentication protocol negotiation virtual file system for Plan 9 from Bell Labs. When a program wants to authenticate
General Dynamics Mission Systems (1,255 words) [view diff] no match in snippet view article find links to article
General Dynamics Mission Systems is a business unit of American defense and aerospace company General Dynamics. General Dynamics Mission Systems integrates
Telecom Enforcement Resource and Monitoring (1,068 words) [view diff] no match in snippet view article find links to article
Telecom Enforcement Resource and Monitoring (TERM), formerly known as Vigilance Telecom Monitoring (VTM), is the vigilance and monitoring wing of the Indian
Chain of trust (465 words) [view diff] exact match in snippet view article find links to article
In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate
Mark Abene (1,333 words) [view diff] no match in snippet view article find links to article
Mark Abene (born February 23, 1972) is an American information security expert and entrepreneur, originally from New York City. Better known by his pseudonym
Derek Atkins (113 words) [view diff] exact match in snippet view article find links to article
Derek A Atkins is a computer scientist specializing in computer security. He studied electrical engineering and computer science at the Massachusetts
ExpressVPN (2,105 words) [view diff] no match in snippet view article find links to article
ExpressVPN is a company providing online privacy and security solutions, including a virtual private network (VPN) service and a password manager. Since
MAC spoofing (1,341 words) [view diff] no match in snippet view article find links to article
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address
Eric Corley (583 words) [view diff] no match in snippet view article find links to article
Eric Gordon Corley (born December 16, 1959), also frequently referred to by his pen name of Emmanuel Goldstein, is a figure in the hacker community. He
ImmuniWeb (992 words) [view diff] no match in snippet view article find links to article
ImmuniWeb is a global application security company headquartered in Geneva, Switzerland. ImmuniWeb develops machine learning and AI technologies for SaaS-based
National Cipher Challenge (507 words) [view diff] no match in snippet view article find links to article
The National Cipher Challenge is an annual cryptographic competition organised by the University of Southampton School of Mathematics. Competitors attempt
GTRI Cyber Technology and Information Security Laboratory (200 words) [view diff] no match in snippet view article find links to article
The Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER) is one of eight labs in the Georgia Tech Research Institute
Setuid (2,019 words) [view diff] no match in snippet view article find links to article
The Unix and Linux access rights flags setuid and setgid (short for set user identity and set group identity) allow users to run an executable with the
Qualys (1,077 words) [view diff] no match in snippet view article find links to article
Qualys, Inc. is an American technology firm based in Foster City, California, specializing in cloud security, compliance and related services. Qualys has
Centre for Development of Telematics (972 words) [view diff] no match in snippet view article find links to article
The Centre for Development of Telematics (C-DOT) is an Indian Government owned telecommunications technology development centre. It was established in
London School of Economics (15,562 words) [view diff] no match in snippet view article find links to article
The London School of Economics and Political Science (LSE), established in 1895, is a public research university in London, England, and a member institution
Pirates of Silicon Valley (3,626 words) [view diff] no match in snippet view article find links to article
Pirates of Silicon Valley is a 1999 American biographical drama television film directed by Martyn Burke and starring Noah Wyle as Steve Jobs and Anthony
Microsoft Forefront (677 words) [view diff] no match in snippet view article find links to article
Microsoft Forefront is a discontinued family of line-of-business security software by Microsoft Corporation. Microsoft Forefront products are designed
Enpass (470 words) [view diff] no match in snippet view article find links to article
Enpass is a freemium password manager and passkey manager available for MacOS, Windows, iOS, Android and Linux, with browser extensions for all major browsers
Rebecca Bace (935 words) [view diff] exact match in snippet view article find links to article
Rebecca "Becky" Gurley Bace (1955–2017) was an American computer security expert and pioneer in intrusion detection. She spent 12 years at the US National
Trusteer (1,949 words) [view diff] exact match in snippet view article find links to article
Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. Loonkar
Aladdin Knowledge Systems (635 words) [view diff] no match in snippet view article find links to article
Aladdin Knowledge Systems Ltd. was a company that produced software for digital rights management and Internet security. The company was acquired by Safenet
FBI Cyber Division (742 words) [view diff] no match in snippet view article find links to article
The Cyber Division (CyD) is a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, including
Veracode (1,093 words) [view diff] no match in snippet view article find links to article
Veracode is an application security company based in Burlington, Massachusetts. Founded in 2006, it provides SaaS application security that integrates
Trusted Platform Module (6,593 words) [view diff] no match in snippet view article find links to article
A Trusted Platform Module (TPM) is a secure cryptoprocessor that implements the ISO/IEC 11889 standard. Common uses are verifying that the boot process
NetScreen Technologies (576 words) [view diff] no match in snippet view article find links to article
NetScreen Technologies was an American technology company that was acquired by Juniper Networks for US$4 billion stock for stock in 2004. NetScreen Technologies
KeePassXC (342 words) [view diff] no match in snippet view article find links to article
KeePassXC is a free and open-source password manager. It started as a community fork of KeePassX (itself a cross-platform port of KeePass). It is built
Information Technology Act, 2000 (3,243 words) [view diff] no match in snippet view article find links to article
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October
BeyondTrust (1,463 words) [view diff] no match in snippet view article find links to article
BeyondTrust (formerly Symark) is an American company that develops, markets, and supports a family of privileged identity management / access management
Fred Cohen (355 words) [view diff] case mismatch in snippet view article find links to article
Computer Virus Research 1991, A Case for Benevolent Viruses 1991, The Computer Security Encyclopedia - Computer Viruses 1992, A Formal Definition of Computer
NEC (5,607 words) [view diff] no match in snippet view article find links to article
NEC Corporation (日本電気株式会社, Nippon Denki Kabushiki gaisha, an acronym for the Nippon Electric Company) is a Japanese multinational information technology
FBI Cyber Division (742 words) [view diff] no match in snippet view article find links to article
The Cyber Division (CyD) is a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, including
SafeNet (1,241 words) [view diff] no match in snippet view article find links to article
SafeNet, Inc. was an information security company based in Belcamp, Maryland, United States, which was acquired in August 2014 by the French security company
Bluesnarfing (859 words) [view diff] no match in snippet view article find links to article
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops,
HTTP parameter pollution (284 words) [view diff] no match in snippet view article find links to article
HTTP Parameter Pollution (HPP) is a web application vulnerability exploited by injecting encoded query string delimiters in already existing parameters
Lock screen (1,914 words) [view diff] no match in snippet view article find links to article
A lock screen is a computer user interface element used by various operating systems. They regulate immediate access to a device by requiring the user
DNS hijacking (2,246 words) [view diff] no match in snippet view article find links to article
DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved
SafeInCloud (161 words) [view diff] no match in snippet view article find links to article
SafeInCloud is a proprietary password manager to securely store passwords and other credentials offline and in the cloud. It is similar to Enpass which
SMS spoofing (703 words) [view diff] no match in snippet view article find links to article
SMS spoofing is a technology which uses the short message service (SMS), available on most mobile phones and personal digital assistants, to set who the
Institute of Electrical and Electronics Engineers (1,856 words) [view diff] no match in snippet view article find links to article
The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) public charity for electrical engineering, electronics engineering
Host protected area (846 words) [view diff] no match in snippet view article find links to article
The host protected area (HPA) is an area of a hard drive or solid-state drive that is not normally visible to an operating system. It was first introduced
BS 7799 (491 words) [view diff] no match in snippet view article find links to article
BS 7799 was a British standard "Code of Practice for Information Security Management", first published as such by the British Standards Institution (BSI)
ACF2 (310 words) [view diff] case mismatch in snippet view article find links to article
of Minnesota. Jeffrey Yost, "The Origin and Early History of the Computer Security Software Products Industry," IEEE Annals of the History of Computing
Dorothy E. Denning (2,203 words) [view diff] exact match in snippet view article find links to article
website. Denning has received over 20 awards for her innovations in computer security. Key contributions are described below. "A Lattice Model of Secure
ScanSafe (535 words) [view diff] no match in snippet view article find links to article
ScanSafe was a privately held company backed by investors Benchmark Capital and Scale Venture Partners, until its 2009 acquisition by Cisco Systems. The
Allot Ltd. (1,268 words) [view diff] no match in snippet view article find links to article
Allot Ltd., formerly Allot Communications, is an Israeli high-tech company that develops telecommunications software. The company is headquartered in Hod
Department of Defense Cyber Crime Center (1,241 words) [view diff] no match in snippet view article find links to article
The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security
Marcus J. Ranum (1,359 words) [view diff] exact match in snippet view article find links to article
He has held technical and leadership positions with a number of computer security companies, and is a faculty member of the Institute for Applied Network