Search for: "Command and Security Corporation" Results 121 - 140 of 1,016
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Nov 2018, 1:06 pm by Anushka Limaye
Cyber Command vision and the Department of Defense Cyber Strategy. [read post]
30 Mar 2017, 6:48 am by Kenneth Anderson
Rozenshtein, a former contributor to this site who now works at the Department of Justice, is well known to long-time Lawfare readers for his writing on many national security law topics, particularly on issues of national security law in cyber-related topics. [read post]
18 Jan 2016, 8:49 am by Alex R. McQuade, Elina Saxena
National security issues did not qualify for the main debate stage until the second half of the event. [read post]
3 Jan 2021, 10:02 am by Sabrina I. Pacifici
Those questions have taken on particular urgency given that the breach was not detected by any of the government agencies that share responsibility for cyberdefense — the military’s Cyber Command and the National Security Agency, both of which are run by General Nakasone, and the Department of Homeland Security — but by a private cybersecurity company, FireEye. [read post]
4 Oct 2011, 3:28 pm by Steve Bainbridge
Without the blessing conferred by the auditor’s letter or the rating agency’s evaluation, the corporation will have a more difficult time selling securities or remaining listed on a securities exchange. [read post]
17 Jan 2012, 8:42 am by Andrew Ramonas
UMG, which counts Lady Gaga, Kanye West and U2 among its artists, commanded 29.9% of U.S. music sales in 2011, securing the largest market share of any record company, according to Nielsen Co. and Billboard magazine. [read post]
19 Apr 2021, 10:20 am by William Ford, Victoria Gallegos
  Wednesday, April 21, 2021, at 10:00 a.m.: The Wilson Center and the RAND Corporation will co-host an event titled “Business As Usual or Time for Change? [read post]
28 Jun 2019, 11:54 am by Steve Minor
Spears, 570 U.S. 48, 59-60 (2013) ('Unless commanded by the text . . . [read post]
5 May 2014, 4:13 am by Howard Friedman
Levinson, La scoperta goethiana della versione ‘originale’ dei Dieci Comandamenti e la sua influenza sulla critica biblica: Il mito del particolarismo ebraico e dell’universalismo tedesco (The Impact of Johann Wolfgang von Goethe’s Discovery of the 'Original' Version of the Ten Commandments upon Biblical Scholarship: The Myth of Jewish Particularism and German Universalism), (in Il roveto ardente: Scritti sull’ebraismo Tedesco in memoria di Francesca… [read post]
8 Aug 2022, 2:04 pm by Benjamin Pollard
The Senate passed a $740 billion spending bill intended to combat climate change, reduce drug costs, and increase corporate taxes. [read post]
5 Apr 2016, 12:10 am
McCall-Smith, Tides of Change – The State, Business and the Human Lucas Lixinski, Commentary: The Responsibility to Protect and Non-State (Corporate) Actors – More of the Same? [read post]
14 Jul 2010, 10:16 am by Tom Smith
 That's why people who have them can command such astronomical salaries from big corporations; and yes, I concede they can be faked, and many corporations find out the hard way that their golden boy is only brass. [read post]
14 Aug 2012, 10:41 am by Steven Berk
Then maybe high level corporate officers would think twice before uttering, in the words of Henry II’s royal “command”, “Will no one rid me of this troublesome priest? [read post]
26 Apr 2022, 5:01 am by Matthew Fitzgerald, Cort Thompson
  In an effort to secure redundant communications capabilities, Ukrainian Minister of Digital Transformation Mykhailo Federov appealed to Elon Musk for Starlink-enabled internet. [read post]
18 Feb 2012, 10:13 pm by INFORRM
Moreover, the further up the chain of command, the larger the bubble that surrounds the executives. [read post]
6 Jun 2007, 9:55 am
He commented that proposals that could be filed as binding are frequently filed as non-binding because "intrusions are not desirable; people basically don't want to command the company. [read post]
31 Mar 2023, 2:41 am by Seán Binder
John Lubas, deputy commander of the 101st Airborne Division. [read post]
3 Mar 2010, 8:05 pm by Kim Zetter
From that initial access point, the attackers obtained access to the source-code management system or burrowed deeper into the corporate network to gain a persistent hold. [read post]