This is a list of cybersecurity information technologies. Cybersecurity concerns all technologies that store, manipulate, or move computer data, such...
18 KB (1,725 words) - 19:07, 26 March 2025
Computer security (redirect from Information technology security)
cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of...
220 KB (22,314 words) - 20:25, 29 May 2025
Positive Technologies is a Russian information security research company and a global leader in cybersecurity. They are the organizer of Positive Hack...
3 KB (142 words) - 07:54, 24 March 2025
on cybersecurity. CTFs have been shown to be an effective way to improve cybersecurity education through gamification. There are many examples of CTFs...
14 KB (1,491 words) - 23:27, 26 May 2025
global cybersecurity efforts. The NIST Cybersecurity Framework organizes its "core" material into five "functions" which are subdivided into a total of 23...
19 KB (2,245 words) - 19:30, 25 April 2025
internationally recognized as a powerhouse in the cybersecurity domain, with numerous cybersecurity startups, established companies, research institutions...
9 KB (812 words) - 07:14, 8 April 2025
for penetration testing of local election systems. CISA divisions include the: Cybersecurity Division National Cybersecurity and Communications Integration...
25 KB (2,040 words) - 05:36, 16 May 2025
Dell Technologies Inc. is an American multinational technology company headquartered in Round Rock, Texas. It was formed as a result of the September 2016...
14 KB (1,074 words) - 06:37, 22 April 2025
Glossary of Internet-related terms List of computer term etymologies List of HTTP status codes List of information technology acronyms List of operating...
6 KB (339 words) - 22:31, 21 May 2025
Akamai Technologies, Inc. is an American company specialized in content delivery network (CDN), cybersecurity, DDoS mitigation, and cloud services. It...
37 KB (3,098 words) - 23:51, 27 March 2025
Mariarosaria Taddeo (category Philosophers of technology)
digital technologies, governance of digital innovation, ethical governance of AI for national defence, ethics of cybersecurity (the complete list of her publications...
11 KB (1,523 words) - 06:44, 19 May 2025
Palantir Technologies Inc. is an American publicly-traded company that specializes in software platforms for big data analytics. Headquartered in Denver...
111 KB (9,365 words) - 04:43, 26 May 2025
Cyber Security Management System (redirect from Cybersecurity Management System)
form of Information security management system, particularly focussed on protecting automation and transport systems. The EU Cybersecurity Act, of 2019...
2 KB (188 words) - 21:09, 4 March 2025
The Department of Information and Communications Technology (DICT) (Filipino: Kagawaran ng Teknolohiyang Pang-Impormasyon at Komunikasyon) is the executive...
13 KB (1,015 words) - 14:40, 22 May 2025
original on 2016-03-03. "GIAC Certified Unix System Administrator | Cybersecurity Certification". www.giac.org. Retrieved 2020-08-11. "GIAC Certified...
11 KB (428 words) - 18:01, 17 January 2025
extension to the NIST Cybersecurity Framework is the Cybersecurity Maturity Model (CMMC) which was introduced in 2019 (though the origin of CMMC began with...
50 KB (4,843 words) - 19:10, 24 May 2025
trade policy, cybersecurity and China policy, as specific issue areas. ITI sponsors the International Committee for Information Technology Standards (INCITS)...
8 KB (712 words) - 19:55, 9 March 2025
CybExer Technologies is an Estonian cybersecurity company, founded in 2016.[citation needed] In 2018, the company was one of the ten companies listed as a...
3 KB (163 words) - 20:43, 20 August 2024
The Cybersecurity Law of the People's Republic of China (Chinese: 中华人民共和国网络安全法), commonly referred to as the Chinese Cybersecurity Law, was enacted by...
23 KB (2,314 words) - 12:53, 1 April 2025
role on-board Galileo 2nd Generation and will boost performances and cybersecurity for the constellation". Thales Alenia Space. 3 March 2021. Retrieved...
32 KB (927 words) - 21:25, 7 May 2025
Cyber-security regulation (redirect from Cybersecurity Policy)
A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations...
48 KB (5,483 words) - 01:19, 19 May 2025
63 Moons Technologies Limited (stylised as 63 moons technologies), formerly Financial Technologies (India) Limited until 2016, is an Indian company which...
18 KB (1,364 words) - 21:15, 26 May 2025
Transformation Strategy. Cybersecurity Directorate (CSD): The Cybersecurity Directorate provides direction and guidance for cybersecurity policy, architecture...
9 KB (896 words) - 14:59, 7 November 2024
DHS in preventing and responding to cybersecurity incidents involving the Information Technology (IT) systems of federal civilian agencies and critical...
17 KB (1,805 words) - 08:30, 28 December 2021
Cyber Resilience Act (category Wikipedia articles in need of updating from October 2024)
(CRA) is an EU regulation for improving cybersecurity and cyber resilience in the EU through common cybersecurity standards for products with digital elements...
25 KB (2,203 words) - 11:44, 29 May 2025
traditional information technology (IT) systems and industrial control systems (ICS) environment, the so-called "IT in the non-carpeted areas". Examples of operational...
15 KB (1,862 words) - 00:44, 20 May 2025
ISACA (redirect from Certified Information Security Manager)
(CDPSE, 2020) Information Technology Certified Associate (ITCA, 2021) Certified in Emerging Technology (CET, 2021) Certified Cybersecurity Operations Analyst...
15 KB (1,052 words) - 21:20, 25 February 2025
Thoma Bravo (category Private equity firms of the United States)
and cybersecurity software and technology-enabled business service sectors, and uses a "consolidation" or "buy and build" investment strategy. As of July 2023[update]...
32 KB (2,677 words) - 19:52, 6 May 2025
Enterprise IT (CGEIT) Certified Information System Auditor (CISA) CSX (Cybersecurity Nexus Fundamentals) CSXP (Cybersecurity Nexus Practitioner) Interception:...
31 KB (4,033 words) - 11:39, 11 May 2025
Security orchestration (category CS1 maint: multiple names: authors list)
Security orchestration, automation and response (SOAR) is a group of cybersecurity technologies that allow organizations to respond to some incidents automatically...
4 KB (395 words) - 14:45, 19 February 2025