Tags » NIST

Rebuttal - Fire Science vs. Reality

Submitted/Authored by Jeff Chandler – Tacoma, Washington

I would like to offer a rebuttal from the “fact resistant” side, if permitted (I don’t have a web site of my own).  750 more words

Blog

Fire Science vs. Reality

The irrational Great Debate with UL/NIST and Traditional Firefighting

A news story aired recently on Fox 6 News in Milwaukee last Sunday. (Watch it here… 1,358 more words

Blog

Vulnerability Management pt.1 - A custom approach

For this post I’ll be writing about a relatively new subject, at least for me and most of the companies in Brazil and maybe also in south America. 704 more words

Vulnerability

NIST SP 800-160 Draft 2 released

Greg Otto has a new story on FedScoop about NIST and IoT security, with NIST’s 2nd edition of SP 800-160:

“This one is unique, it is special because it addresses the fundamental things that they need to do to build security into these systems from the start,” said NIST Fellow Ron Ross in an interview with FedScoop at the Public Sector Innovation Summit. 231 more words

Download Mehran Mirmiri - Mohem Nist | IranTune

Listen To “Mohem Nist” By “Mehran Mirmiri” Now On IranTune , Browse New Musics and Videos On IranTune.Mehran Mirmiri Mohem Nist, Download Mehran Mirmiri Mohem Nist, Mehran Mirmiri Mohem Nist Mp3 Song, Download Latest Mp3 Song Mehran Mirmiri Mohem Nist, Mehran Mirmiri Mohem
http://www.irantunez.com/music/mehran-mirmiri-mohem-nist

New Orleans Section Conducts Cybersecurity Seminar

The ISA New Orleans Section held their inaugural ICS Cybersecurity summit on Wednesday, April 27, 2016. The event featured guest panelists from the local engineering and IT community, as well as a guest speaker from Cisco. 319 more words

Cybersecurity

Top CyberSecurity News For 27th April 2016

1. U.S. Cyberattacks Target ISIS in a New Line of Combat. From NYTimes. The United States has opened a new line of combat against the Islamic State, directing the military’s six-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons. 268 more words