Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1799

MITRE 360 March

MITRE 360
March 27, 2025
… countries access MITRE ATT&CK ®—a global knowledge base of cyber adversary behavior. This free online data-sharing platform—considered “foundational” to the worldwide cybersecurity …

The Trusted Automated eXchange of Indicator Information (TAXII™)

Publication
November 08, 2012
… worms have given way to skillful, persistent adversaries seeking specific information, such as online banking credentials, intellectual property, or national security information. Other … The adversary identifies and investigates targets. Web mining against corporate websites and online conference attendee lists Weaponize The set of attack tools are packaged for delivery and … Threats: A Decade in Review,” Command Five Pty Ltd, June 2011. URL http://www.commandfive.com/papers/C5_APT_ADecadeInReview.pdf [3] E.M. Hutchins, M.J. Cloppert and R.M Amin PH.D., …

National Cybersecurity FFRDC

… FFRDC Securing systems for an interconnected world. IN THIS SECTION NCF Leadership Contact the Team News & Insights Fact Sheet Read more about the Cybersecurity FFRDC Download Our … and Development Centers in the 21st Century Download Focus Area Cybersecurity Read More Contact Us Connect with the NCF Team We help government partner with business, academia, and the technical community to develop better cyber defenses. Contact Us Latest News & Insights Publication MITRE Fast-tracking Acquisition Security …

A National Strategy for Digital Health

Publication
March 01, 2022
… Digital Health Digital Health Team Defining a national strategy for digital health is critical to ensure digital technologies are not just “layered” on top of the current system that is … yields poor health outcomes. COVID-19 was our wake-up call. Our world was turned upside down in an instant as health officials, government leaders, and everyone scrambled to deal with a … Defining a national strategy for digital health is critical to ensure digital technologies are not just “layered” on top of the current system that is …

Cyber Resiliency Approaches and Controls to Mitigate Adversary TTPs, Revision 2

Publication
July 18, 2022
… Cyber Resiliency Approaches and Controls to Mitigate Adversary TTPs, Revision 2 Deborah Bodeau Richard Graubart Linda K. Jones Ellen … David K. Black Learn cyber resiliency approaches and security controls that can be used to thwart cyber threats in this first-of-a-kind, comprehensive mapping of cyber resiliency controls to techniques in … (T0878), Block Command Message (T0803), Block Reporting Message (T0804), and Block Serial COM (T0805). Some correspond to Techniques under the Impact Tactic in A4E: Data Destruction …

Dual-band microstrip ringed patch antenna

Tue, 06/10/2008 - 12:00
Patented
… This invention is about a novel microstrip patch antenna which is capable of operating in two different frequency bands. The antenna provides a broad beam serving a hemispherical … and plays an important role of generating the second frequency band. There is no direct metal contact between the ring and the patch itself. The patch can be fed by two orthogonal probes to generate circular polarization (CP) or a single probe to generate linear polarization (LP). …

CVE Program Partners with Cybersecurity & Infrastructure Security Agency to Protect Industrial Control Systems and Medical Devices

Media Coverage
September 15, 2020
… CVE Program Partners with Cybersecurity & Infrastructure Security Agency to Protect Industrial Control Systems and Medical Devices The Common Vulnerabilities and … vendors participating as CVE Numbering Authorities (CNAs). CNAs are organizations authorized to assign CVE IDs for vulnerabilities affecting products within a distinct scope. A Top-Level … as CISA, manages a group of CNAs within a given domain or community and may assign CVE IDs to vulnerabilities. As the Top-Level Root for ICS and medical devices, CISA is responsible for …

Defense Agile Acquisition Guide: Tailoring DoD IT Acquisition Program Structures and Processes to Rapidly Deliver Capabilities

Publication
March 12, 2014
… Defense Agile Acquisition Guide: Tailoring DoD IT Acquisition Program Structures and Processes to Rapidly Deliver Capabilities Su Chang This guide provides DoD acquisition professionals with … to adopt Agile practices within each element of their programs, thus helping them to succeed in an increasingly complex environment. The Department of Defense (DoD) needs an acquisition … challenges associated with information assurance. Agile development practices can help the DoD to transform IT acquisition by delivering capabilities faster and responding more effectively to …

Testing Your Network Defenses by Imitating Malicious Adversaries

Impact Story
October 14, 2019
… Testing Your Network Defenses by Imitating Malicious Adversaries As cyber adversaries attempt to break into millions of networks daily, it’s more important than ever to build systems that are … every year running sophisticated programs to test their cyber defenses. They might even send in a group of experts to carry out simulated attacks on their networks. This process—referred to … As cyber adversaries attempt to break into millions of networks daily, it’s more important than ever to build systems that are …

A "Thin-Slicing" Approach to Understanding Cognitive Challenges in Complex Command and Control

Publication
February 01, 2007
… of making sense of situations based on the thinnest slice of experience.” (from Gladwell.com/Blink). Choosing a CTA Technique Unfortunately, CTA has not matured to the point where there … out” (Shepherd, 2001, p. 1). We felt that GDTA, Team CTA, and TKS would require much more contact with the POC personnel than the time period available. We looked closer at CDM, …
  • First page
  • Previous page
  • …
  • Page 72
  • Page 73
  • Page 74
  • Page 75
  • Current page 76
  • Page 77
  • Page 78
  • Page 79
  • Page 80
  • …
  • Next page
  • Last page
Displaying 751 - 760 of 1799
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links