Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1799

Washington Post: With New Sponsors, ‘It’s Academic’ Lives on to Keep Quizzing High School Students

Media Coverage
June 16, 2021
… Washington Post: With New Sponsors, ‘It’s Academic’ Lives on to Keep Quizzing High School Students The Washington Post features the new sponsors for "It’s … David Rubenstein as title sponsor and MITRE as platinum sponsor. MITRE is contributing to this unique and iconic program, as well as continuing our commitment to motivate students to discover, create, and lead in their communities. Fostering young talent and their interest in STEM and other disciplines is …

Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations

Publication
February 25, 2016
… Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations Clement Skorupka Ph.D. Lindsley … cyber security program looks like. The authors identify a selection of key practices in each of five areas. ​Actionable threat intelligence plays a critical role in cyber defense, … Actionable threat intelligence plays a critical role in cyber defense, from helping to protect systems and data, to protecting organizations, …

Arming the Eagle, Outpacing the Dragon: Understanding and Out Competing China’s Defense Acquisition and Innovation System

Publication
June 17, 2022
… System Dan Ward Matt MacGregor "Arming the Eagle" examines the Chinese military’s approach to acquisition & innovation, highlighting their primary strategies for fielding new military capabilities. It then recommends strategies the DoD should adopt to maintain a technical advantage. Over the past two decades, the Chinese government has made … strategic reorganization, highly focused warfighting concepts, and technological advances. To address the challenge of a competitor gaining military parity, the Department of Defense (DoD) …

CyberSecurity Monitoring Tools and Projects: A Compendium of Commercial and Government Tools and Government Research Projects

Publication
January 01, 2001
… Pro, BlackICE Sentry, and BlackICE Defender. Source of Information http://www.networkice.com/Products/BlackICE/blackice http://www.networkice.com/Products/BlackICE/blackice CyberSecurity … information, activity graphs, and replays of network sessions. Dragon sensors also have ‘plug ins’ which allow them to communicate with a central management node. Architecture … Responses to network probing Reports Vulnerability reports, sometimes include hot links to online vendor and patch resources Update Method Updates free to licensed customers, not …

Compendium of Anomaly Detection and Reaction Tools and Projects

Publication
May 01, 2000
… Pro, BlackICE Sentry, and BlackICE Defender. Source of Information http://www.networkice.com/Products/BlackICE/blackice http://www.networkice.com/Products/BlackICE/blackice Compendium of … information, activity graphs, and replays of network sessions. Dragon sensors also have ‘plug ins’ which allow them to communicate with a central management node. Architecture Agents-Director … Responses to network probing Reports Vulnerability reports, sometimes include hot links to online vendor and patch resources Reactions Update Method Updates free to licensed customers, not …

December 2016 Federal Big Data Summit Report

Publication
March 29, 2017
… development. Policies need to be put in place to allow for simple data sharing and avenues for com- munication between agencies need to be established for easy access and aggregation of data. … operating environment. The trustworthiness discussion identified the need to have stakeholder buy-in for access control, data sharing, privacy and so forth. This led to consideration of data …

Intrusion Reaction Recommendations for Obtaining Reaction Capabilities

Publication
September 01, 1998
… for Stalker 3.0 by Trusted Information Systems in a 1998 press release, at http://www.tis.com/corporate/press/98/stalker3pr.html (as of October 6, 1998). 16 more than a vendor is willing to risk on speculation13. In a commercial marketplace where enterprises are willing to buy relatively simple detectors, vendors may lack motivation to invest in research and …

Supply Chain Attack Framework and Attack Patterns

Publication
February 21, 2014
… Patterns John Miller This paper details a study that addresses supply chain attacks relevant to Department of Defense acquisition program planning. MITRE compiled sets of data sources previously unavailable and generated a list of attack patterns related to supply chain risk. During FY13, MITRE conducted an effort on behalf of the Office of the … engineering, together with potential application approaches for assessing malicious insertion in critical components of DoD systems being acquired or sustained.​ Supply Chain Attack Framework …

Critical Infrastructure Cyberspace Analysis Tool (CICAT™)

Thu, 02/03/2022 - 12:00
Copyrighted
… for Windows, Linux, and MacOS. Interested in licensing CICAT for your organization’s use? Contact Us . … and well-being of our nation. Interested in licensing CICAT for your organization’s use? Contact: techtransfer@mitre.org © 2021 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR … leverage their expertise in nuclear technology and power plant operations. MITRE deployed an online ICS/SCADA repository of CAPEC-based [5] attack vectors to assist CRP participants in their …

Mission-Focused and Industry-Driven Rapid Acquisition

Publication
March 31, 2025
… from warfighter gap to contract award. Join us in transforming the blueprint for acquisition. Contact breakingbarriers@mitre.org .   Breaking Barriers in Defense Acquisition MITRE’s "Breaking … think tanks, and media representatives. Help transform the blueprint for acquisition. Contact us at breakingbarriers@mitre.org breakingbarriers@mitre.org …
  • First page
  • Previous page
  • …
  • Page 69
  • Page 70
  • Page 71
  • Page 72
  • Current page 73
  • Page 74
  • Page 75
  • Page 76
  • Page 77
  • …
  • Next page
  • Last page
Displaying 721 - 730 of 1799
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links