Companies similar to CAL STAC
Sign up to Download

1-30 of 5,417,692 results

  • calstac.org
The California State Threat Assessment Center (STAC) is the centerpiece of the State's information sharing environment (ISE), and provides for the State's subsequent ability to maintain situational awareness over its broad threat domains in an effort..

Relevance: 20.319092
  • healthexec.com
  • 1
The financing was led by Concord Health Partners in conjunction with AlbaCore Capital Group and London-based Hambro Perks... The proposed union would pose a significant threat to cost, quality, and access to healthcare, according to the state's..

Relevance: 16.905087
  • www.cci.msstate.edu
  • 5
  • 5
  • 16
At CCI, we harness Mississippi State's High Performance Computing Collaboratory and our network of partners to deliver rapid, research-backed cyber solutions. Our work strengthens government and scientific missions, accelerates commercial..

Relevance: 16.23631
  • www.buildbetternd.org
  • 1
Build Better North Dakota is a campaign to raise standards in North Dakota's energy industry to ensure that development of the state's abundant resources is sustainable and benefits all North Dakotans. We are working with people on the front lines of..

Relevance: 14.985497
  • www.dipssgo.com
  • 1
  • 1
Our team is able to quickly and effectively operate in all of Department of State's mission locations, including high threat areas. Our capabilities and unique qualifications to provide sustained support of the five service categories... We present..

Relevance: 14.4114
  • stefanmaerz.com
  • 1
I am a passionate and hardworking SRE with over 10 years of progressive experience as a Site Reliability Engineer, cybersecurity engineer, and cybersecurity architect. Sharply analytical and eager to learn. Recognized as a top performer, I have won..

Relevance: 14.4114
  • sdstatesattorneys.org
  • 67
  • 116
  • 3
The South Dakota State's Attorneys Association represents State's Attorneys and local prosecutors in all 66 South Dakota Counties. Each county State's Attorney is invited to membership. Associate members include Deputy State's Attorneys, the Attorney..

Relevance: 13.464259
  • nothreat.com
  • 1
Threat assessments and active threat management performed by Manny Tau, Psy.D., clinical and forensic psychologist specializing in threat assessments, active threat management, and workplace/school-place/domestic violence. Discreet and confidential..

Relevance: 13.410485
  • www.nothreat.com
  • 1
  • 2
Threat assessments and active threat management performed by Manny Tau, Psy.D., clinical and forensic psychologist specializing in threat assessments, active threat management, and workplace/school-place/domestic violence. Discreet and confidential..

Relevance: 13.324604
  • tomhegel.com
I am an accomplished cybersecurity researcher and a leader in the threat intelligence space, with a background of tracking some of the most interesting and unique threat actors globally. My dedication lies in creating and collaborating within the..

Relevance: 12.968572
  • www.alliedtechnicalservices.com
  • 3
  • 4
  • 3
Allied Technical Services LLC (ATS) is a certified Service Disabled Veteran Owned Small Business (SDVOSB) which has contracts with the Department of Homeland Security's Transportation Security Administration (TSA), Department of State's Export..

Relevance: 12.9579115
  • miwheat.org
  • 1
  • 11
  • 11
The Michigan Wheat Program (MWP), the state's wheat check-off program was approved by the state's wheat farmers in July 2011. The Michigan Wheat Program is established under PA 232, 1965, the Agricultural Commodities Marketing Act... The MWP will..

Relevance: 12.954065
  • www.threatq.com
  • 2
  • 1
The ThreatQ Platform enables organizations to aggregate, analyze, and act on threat intelligence, reducing complexity and improving decision-making. Learn how ThreatQuotient can help you focus on the right threats... ThreatQ supports an ecosystem of..

Relevance: 12.8973
  • statewide.usu.edu
  • 18
  • 18
  • 5
Utah State's 30 locations across Utah provide access to a variety of high-caliber programs with personalized support and flexibility to fit your life... Utah State's residential campuses in Logan, Blanding, and Eastern in Price, provide the state's..

Relevance: 12.888123
  • www.threatmodelingmanifesto.org
The Threat Modeling Manifesto documents the values, principles and key characteristics as an industry guidance for conducting threat modeling... We developed this Manifesto after years of experience thinking about, performing, teaching, and..

Relevance: 12.867658
  • www.threatmodelingmanifesto.org
We developed this Manifesto after years of experience thinking about, performing, teaching, and developing the practice of, Threat Modeling. We have diverse backgrounds as industry professionals, academics, authors, hands-on experts, and presenters...

Relevance: 12.859596
  • i.threatbook.io
  • 2
Established in 2015, ThreatBook has been an innovative player in the cyber security industry, continually delivering precise, efficient, and intelligent solutions for cyber threat detection and response. ThreatBook takes the pioneering role in..

Relevance: 12.852623
  • www.ciscoblogs.com
In future episodes we will explore the individual security components of Cisco Firepower Threat Defense even deeper; things like outbreak controls and behavioral Indications of Compromise, network, file and device trajectory, as well as threat..

Relevance: 12.850206
  • www.waopenforbusiness.wa.gov.au
  • 1
  • 1
  • 7
Agribusiness & Food Investment is an office established by the Western Australian Government dedicated to supporting the growth and development of the state's agriculture, fisheries and food industries... WA Open for Business: An Independent Office..

Relevance: 12.83257
  • www.imspatial.com
  • 1
This website provides public access to Washington State's Voter Registration Database (VRDB) as allowed by RCW 29A.08.710 and RCW 29A.08.720. The data is sourced from the Washington Secretary of State's monthly public extracts...

Relevance: 12.830314
  • www.secverse.org
What is Threat Detection? Threat detection is the practice of analyzing the entirety of a security …..

Relevance: 12.792635
  • www.threat-intelligence.eu
While developing various open-source tools in the threat intelligence field (e.g., MISP and cve-search), we noticed the lack of a central place that brings together open standards, documents, methodologies, and processes... To address this, we..

Relevance: 12.751326
  • threatassessmenttracking.com
  • 2
  • 1
This behavioral threat assessment instrument follows the Comprehensive School Threat Assessment Guidelines (CSTAG) developed by Professor Dewey Cornell of the University of Virginia. Our software also supports the Virginia Model and the USSS NTAC..

Relevance: 12.731992
  • www.cfhtrust.com
  • 1
  • 9
The Colorado Firefighter Trust was created to help the state's fire professionals and agencies manage the illnesses affecting first responders... The Colorado Firefighter Heart, Cancer Behavioral Health Benefits Trust was created to help the state's..

Relevance: 12.68783
  • www.vmray.com
  • 4
  • 4
  • 8
And bolster your organization's cyber resilience by seamlessly integration and advanced detection capabilities... And elevate your threat detection capabilities by leveraging VMRay's advanced malware analysis sandbox... And gain a strategic..

Relevance: 12.642639
  • www.su-mac.org
  • 1
To develop and implement a sustainable national mine action programme, able to plan, coordinate, implement and monitor all aspects of Mine Action in the Sudan and mobilize the required resources to make Sudan free from the threat of landmines/ERW..

Relevance: 12.639849
  • threatintelligenceplatform.com
  • 1
Threat Intelligence Platform combines several threat intelligence sources to provide in-depth insights on threat hosts and attack infrastructure. Correlating threat information from various feeds with our exhaustive in-house databases, a result of..

Relevance: 12.585302
  • precisionsec.com
  • 1
PrecisionSec's Threat Feeds fill the gaps in your existing detection, enabling more effective defensive operations. We offer curated threat intelligence focused on the malware and C2 frameworks that are typically utilized in an intrusion or incident...

Relevance: 12.490437
  • hawk-eye.io
  • 1
  • 1
HawkEye is built on cyber threat landscape and threat actor tradecraft. This means it is built with in-depth knowledge on threat actor activities and behavior. By leveraging our expertise and conducting in-house red, blue, and purple teaming we..

Relevance: 12.486154
  • www.diverse-team.fr
  • 1
  • 1
  • 216
Threat modeling is recognized as one of the most important activities in software security. It helps to address security issues in software development. Several threat modeling processes are widely used in the industry such as the one of Microsoft..

Relevance: 12.473078