TITLE

APCO speaker outlines potential PSAP cybersecurity strategies in heightened threat environment

AUTHOR(S)
Toone, Stephanie
PUB. DATE
November 2015
SOURCE
Urgent Communications Exclusive Insight;11/19/2015, p1
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers public-safety answering points (PSAP) cybersecurity strategies.
ACCESSION #
111235415

 

Related Articles

  • Cyber plan's future bleak. Fisher, Dennis // eWeek;2/24/2003, Vol. 20 Issue 8, p1 

    Reports on problems within the U.S. federal government's security community that prohibits the implementation of the initiatives suggested by the National Strategy to Secure Cyberspace. Unlikely implementation in the overall state of network security due to the obstacles; Need for people with...

  • DEFENDING CYBERSPACE. Graves, Brad // San Diego Business Journal;3/19/2012, Vol. 33 Issue 12, p1 

    The article discusses the efforts in San Diego, California to defend its cyberspace from hackers, including the increase by San Diego State University and University of California (UC) San Diego of the area's computer security talent.

  • NEWS BRIEFS.  // SC Magazine: For IT Security Professionals (15476693);Feb2014, Vol. 25 Issue 2, p12 

    This section offers news briefs related to cyber security in the U.S. as of February 2014, including the announcement by retail company Target that it may have compromised around 40 million credit and debit card accounts due to cyber attack, and the findings by German researchers on the...

  • Over 2 mln Romanian IPs involved in cyber security incidents.  // Regional Today;3/12/2014, p2 

    The article reports on the data received by the Romanian National Computer Security Incident Response Team concerning cyber security alerts in 2013.

  • Cybersecurity Threat Grows. Investor's Business Daily // Investors Business Daily;12/31/2014, pA01 

    2 Attacks at

  • A critical problem.  // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2015, p5 

    An introduction is presented in which the editor discusses various reports within the issue on topics including the attacks on utilities and the threat of high-level attack on critical infrastructure, the keys to securing control systems or cyber-security, and the use of threat intelligence.

  • ASSESSING COMPREHENSIVE SECURITY APPROACHES IN ACTION: AN INTRODUCTION. Sweijs, Tim; Jovanovic, Milos // Information & Security;2015, Vol. 33 Issue 1, p1 

    The article presents an introduction to the journal on assessing comprehensive security approach.

  • COMPREHENSIVE SECURITY AND SOME IMPLEMENTAL LIMITS. PREZELJ, Iztok // Information & Security;2015, Vol. 33 Issue 1, p13 

    The changing security environment has led to the development of comprehensive security approaches, strategies and policies. The 'Holistic approach' has become an academic and practical mantra. This paper argues, however, that comprehensive security approaches face serious obstacles to their...

  • Reduce the risk of cybersecurity breach. Ireland, Ben; Coren, Benjamin // Travel Weekly (UK);5/23/2019, Issue 2476, p11 

    The article reports that Advantage Travel Partnership members were urged to beef up their cybersecurity to help reduce the risk of their websites being cloned or customers' data being stolen.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics