Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
1,024 result(s) for "Pratt, Mary K"
Sort by:
Exploring under the sea
This title covers deep sea exploration, from ancient attempts to modern exploration using advanced technology.
Elizabeth I : English Renaissance queen
Examines the remarkable life of Queen Elizabeth I. Learn about the queen's family background, childhood, education, as well as the saga of her ascension to the throne and influential rule--from the trials she faced with international diplomacy, military campaigns, and religious conflict to the Golden Age she inspired through her support of the arts and global exploration.
Shadow IT is increasing and so are the associated security risks
[...]it is as big a problem as ever and may even worsen. [...]these workers are creating entry points that hackers can use to access the enterprise IT environment to launch all sorts of attacks. Technologies such as SaaS management tools, data loss prevention solutions, and scanning capabilities all help identify unsanctioned applications and devices within the enterprise. According to Mixter, that means: * Developing guidance targeted at business technologists. * Offering options for business technologists to secure their work. * Helping business technologists gain relevant security certifications. * Integrating cybersecurity solutions into business technologist workflows. * Building policies that explicitly cover business technologist activities.
Trade Publication Article
What is computer coding?
\"This title shows young tech buffs and casual tech users alike that coding is doable and fun for everyone. Even the youngest computer users can get in on the fun of learning about coding!\"-- Provided by publisher.
Evil digital twins and other risks: the use of twins opens up a host of new security concerns
[...]as companies expand their use of digital twins and others create new ones, experts say organizations are also increasing their cybersecurity exposure. Because digital twins rely on data to create an accurate representation of whatever they model, they are vulnerable. What if that data is corrupted or — far worse — stolen and used for evil rather than their intended purpose? “Here we have another tool, and it can be beneficial, but it still needs to be hardened, it still needs cybersecurity applied to it, the connection to the internet has to be secured, and the data has to be protected,” says Brian Bothwell, a director in the science, technology assessment, and analytics (STAA) team at the US Government Accountability Office and author of a February 2023 GOA report on digital twins. According to some, a digital twin can also be a duplicate of a person such as an employee or a persona — a digital representation of an individual entity such as a customer or a company. [...]there are additional concerns with the growing use of digital twins, says Kayne McGladrey, a senior member of the Institute of Electrical and Electronics Engineers (IEEE), a nonprofit professional association, and field CISO at Hyperproof.
Trade Publication Article
How can we reduce household waste?
\"This title delves into different issues pertaining to household waste and its causes, effects, and how we can proactively deal with it to make our planet a cleaner and healthier place.\"-- Provided by publisher.
Why reporting an incident only makes the cybersecurity community stronger
“What we need is a proper culture of notification and investigation of all incidents, aimed not at assessing blame (or worse, mocking the victims, as sometimes happens) but rather at learning lessons and improving security for everyone,” says Stefano Zanero, a Polytechnic University of Milan professor whose research focuses on cybersecurity and is an Information Systems Security Association (ISSA) International board member. Incident reporting has many benefits CISOs and their teams, analysts and researchers, security vendor professionals, and even some government officials have a long history of sharing information — albeit not because sharing has been mandated. [...]reporting IOCs allows law enforcement and other government agencies to assist organizations during cyber events. Existing information-sharing networks As vice president and CISO of global tech company Insight and a former security leader at RSA, a security software company, Jason Rader has for years regularly met with US government officials to provide intelligence.
Trade Publication Article
When and how to report a breach to the SEC
New cybersecurity reporting requirements for publicly traded companies are expected to be enacted in the spring of 2023, with proposed rules from the US Securities and Exchange Commission (SEC) looking for more information and transparency from those hit with security incidents. Under the proposal, the SEC would implement three new rules that public companies will need to follow: * A requirement that companies report any cybersecurity event within four business days of determining that it was a material incident. * Mandatory disclosures regarding the board of directors’ oversight of cybersecurity risk as well as details about the cybersecurity expertise and experience of individual board members. * Mandatory disclosures about management’s role in addressing cybersecurity risk. The SEC’s plan, according to commission officials, security leaders, and board advisors, is intended to make investors better informed about incidents that could impact corporate performance and stock prices. SEC reporting requirements enhance risk management In announcing the proposed rule changes in early 2022, the SEC also said the updated requirements are meant “to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies.
Trade Publication Article