• This is a list of cybersecurity information technologies. Cybersecurity concerns all technologies that store, manipulate, or move computer data, such...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • Thumbnail for Computer security
    cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of...
    220 KB (22,314 words) - 20:25, 29 May 2025
  • Positive Technologies is a Russian information security research company and a global leader in cybersecurity. They are the organizer of Positive Hack...
    3 KB (142 words) - 07:54, 24 March 2025
  • Thumbnail for Capture the flag (cybersecurity)
    on cybersecurity. CTFs have been shown to be an effective way to improve cybersecurity education through gamification. There are many examples of CTFs...
    14 KB (1,491 words) - 23:27, 26 May 2025
  • global cybersecurity efforts. The NIST Cybersecurity Framework organizes its "core" material into five "functions" which are subdivided into a total of 23...
    19 KB (2,245 words) - 19:30, 25 April 2025
  • internationally recognized as a powerhouse in the cybersecurity domain, with numerous cybersecurity startups, established companies, research institutions...
    9 KB (812 words) - 07:14, 8 April 2025
  • Thumbnail for Cybersecurity and Infrastructure Security Agency
    for penetration testing of local election systems. CISA divisions include the: Cybersecurity Division National Cybersecurity and Communications Integration...
    25 KB (2,040 words) - 05:36, 16 May 2025
  • Thumbnail for Dell Technologies
    Dell Technologies Inc. is an American multinational technology company headquartered in Round Rock, Texas. It was formed as a result of the September 2016...
    14 KB (1,074 words) - 06:37, 22 April 2025
  • Glossary of Internet-related terms List of computer term etymologies List of HTTP status codes List of information technology acronyms List of operating...
    6 KB (339 words) - 22:31, 21 May 2025
  • Thumbnail for Akamai Technologies
    Akamai Technologies, Inc. is an American company specialized in content delivery network (CDN), cybersecurity, DDoS mitigation, and cloud services. It...
    37 KB (3,098 words) - 23:51, 27 March 2025
  • Mariarosaria Taddeo (category Philosophers of technology)
    digital technologies, governance of digital innovation, ethical governance of AI for national defence, ethics of cybersecurity (the complete list of her publications...
    11 KB (1,523 words) - 06:44, 19 May 2025
  • Palantir Technologies Inc. is an American publicly-traded company that specializes in software platforms for big data analytics. Headquartered in Denver...
    111 KB (9,365 words) - 04:43, 26 May 2025
  • form of Information security management system, particularly focussed on protecting automation and transport systems. The EU Cybersecurity Act, of 2019...
    2 KB (188 words) - 21:09, 4 March 2025
  • Thumbnail for Department of Information and Communications Technology
    The Department of Information and Communications Technology (DICT) (Filipino: Kagawaran ng Teknolohiyang Pang-Impormasyon at Komunikasyon) is the executive...
    13 KB (1,015 words) - 14:40, 22 May 2025
  • original on 2016-03-03. "GIAC Certified Unix System Administrator | Cybersecurity Certification". www.giac.org. Retrieved 2020-08-11. "GIAC Certified...
    11 KB (428 words) - 18:01, 17 January 2025
  • extension to the NIST Cybersecurity Framework is the Cybersecurity Maturity Model (CMMC) which was introduced in 2019 (though the origin of CMMC began with...
    50 KB (4,843 words) - 19:10, 24 May 2025
  • trade policy, cybersecurity and China policy, as specific issue areas. ITI sponsors the International Committee for Information Technology Standards (INCITS)...
    8 KB (712 words) - 19:55, 9 March 2025
  • CybExer Technologies is an Estonian cybersecurity company, founded in 2016.[citation needed] In 2018, the company was one of the ten companies listed as a...
    3 KB (163 words) - 20:43, 20 August 2024
  • Thumbnail for Cybersecurity Law of the People's Republic of China
    The Cybersecurity Law of the People's Republic of China (Chinese: 中华人民共和国网络安全法), commonly referred to as the Chinese Cybersecurity Law, was enacted by...
    23 KB (2,314 words) - 12:53, 1 April 2025
  • Thumbnail for List of Galileo satellites
    role on-board Galileo 2nd Generation and will boost performances and cybersecurity for the constellation". Thales Alenia Space. 3 March 2021. Retrieved...
    32 KB (927 words) - 21:25, 7 May 2025
  • A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations...
    48 KB (5,483 words) - 01:19, 19 May 2025
  • 63 Moons Technologies Limited (stylised as 63 moons technologies), formerly Financial Technologies (India) Limited until 2016, is an Indian company which...
    18 KB (1,364 words) - 21:15, 26 May 2025
  • Thumbnail for United States Army Chief Information Officer
    Transformation Strategy. Cybersecurity Directorate (CSD): The Cybersecurity Directorate provides direction and guidance for cybersecurity policy, architecture...
    9 KB (896 words) - 14:59, 7 November 2024
  • Thumbnail for National Cybersecurity and Critical Infrastructure Protection Act of 2013
    DHS in preventing and responding to cybersecurity incidents involving the Information Technology (IT) systems of federal civilian agencies and critical...
    17 KB (1,805 words) - 08:30, 28 December 2021
  • Thumbnail for Cyber Resilience Act
    Cyber Resilience Act (category Wikipedia articles in need of updating from October 2024)
    (CRA) is an EU regulation for improving cybersecurity and cyber resilience in the EU through common cybersecurity standards for products with digital elements...
    25 KB (2,203 words) - 11:44, 29 May 2025
  • traditional information technology (IT) systems and industrial control systems (ICS) environment, the so-called "IT in the non-carpeted areas". Examples of operational...
    15 KB (1,862 words) - 00:44, 20 May 2025
  • (CDPSE, 2020) Information Technology Certified Associate (ITCA, 2021) Certified in Emerging Technology (CET, 2021) Certified Cybersecurity Operations Analyst...
    15 KB (1,052 words) - 21:20, 25 February 2025
  • Thoma Bravo (category Private equity firms of the United States)
    and cybersecurity software and technology-enabled business service sectors, and uses a "consolidation" or "buy and build" investment strategy. As of July 2023[update]...
    32 KB (2,677 words) - 19:52, 6 May 2025
  • Enterprise IT (CGEIT) Certified Information System Auditor (CISA) CSX (Cybersecurity Nexus Fundamentals) CSXP (Cybersecurity Nexus Practitioner) Interception:...
    31 KB (4,033 words) - 11:39, 11 May 2025
  • Security orchestration (category CS1 maint: multiple names: authors list)
    Security orchestration, automation and response (SOAR) is a group of cybersecurity technologies that allow organizations to respond to some incidents automatically...
    4 KB (395 words) - 14:45, 19 February 2025