MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
August 12, 2005
Roy Mark
Lieberman Raps Federal IT Security Systems The senator points to latest GAO report underscoring pervasive computer security weaknesses in 24 major government agencies. According to the report, the deficiencies place federal operations and assets at increased risk. mark for My Articles similar articles
InternetNews
July 19, 2005
Roy Mark
GAO: Federal Systems Security Still Lacking A new report finds major security weaknesses at 24 major federal agencies. mark for My Articles similar articles
National Defense
February 2016
Chris Wiedemann
Finance, Health Care, Agriculture Play Key Roles in Critical Infrastructure Protection Anyone looking to support the mission of critical infrastructure protection outside of DHS should be reaching out to the Departments of Treasury, Health and Human Services, and Agriculture. mark for My Articles similar articles
Fast Company
David Lumb
In-Air Wi-Fi Apparently Makes Planes Hackable A new report by the U.S. Government Accountability Office for the Federal Aviation Administration describes the fearsome scenario of a hacker breaking into a plane's avionics through in-flight Wi-Fi. mark for My Articles similar articles
Reason
March 2005
Poole & Harper
Transportation Security Aggravation Debating the balance between privacy and safety in a post-9/11 aviation industry. mark for My Articles similar articles
IEEE Spectrum
March 2006
Plane Talk About Cellphones With the first U.S. auction for radio spectrum for consumer broadband use while in the air on the horizon, the FCC's overall move in the direction of relaxing the ban on the use of personal electronics during flight has made some folks happy -- and many others worried. mark for My Articles similar articles
InternetNews
April 22, 2010
White House To Modernize Cybersecurity Reports New directive requires government agencies to get with the times and abandon paper-based reporting for real-time digital updates on all potential cyber-security threats. mark for My Articles similar articles
CIO
January 15, 2002
Elana Varon
Homeland Defense: New Rules of War Fighting terrorism has put executives on the front lines to defend their company's IT infrastructure and help the government smoke out terrorists. But the rules of engagement are still emerging... mark for My Articles similar articles
InternetNews
August 30, 2005
Roy Mark
GAO: Feds Not Protecting Citizen Privacy Government agencies are making progress, but are still not completely complying with federal rules regarding data mining and personal information. mark for My Articles similar articles
National Defense
January 2009
Sandra I. Erwin
Government Reports Depict Alternate Realities Federal agency reports can be notoriously oblivious to facts. mark for My Articles similar articles
National Defense
June 2004
Pappalardo & Erwin
Security Beat Law enforcement agencies, using grant money from the federal government, increasingly are investing in robots to prepare for domestic threats. mark for My Articles similar articles
National Defense
February 2004
Geoff S. Fein
Security Beat Federal government gets 'D' in cyber-security... DHS awards multiple security contracts... Companies selected for air defense program... etc. mark for My Articles similar articles
InternetNews
February 16, 2005
Tim Gray
Feds Fail Computer Security Test Despite improvements, the government's computer security program proves lacking once again. mark for My Articles similar articles
InternetNews
October 14, 2010
Defense, Homeland Security Team in Cyber Push Top military and civilian agencies join forces to pool resources and share personnel in the ongoing struggle to preempt and combat threats against U.S. digital systems. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. mark for My Articles similar articles
InternetNews
November 10, 2009
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. mark for My Articles similar articles
Information Today
May 31, 2012
Barbie E. Keiser
Government in the Mobile Era A document released May 23, 2012, Digital Government: Building a 21 st Century Platform to Better Serve the American People, reveals the Obama administration strategy to enable citizens to find the services they need across government programs, "anytime, anywhere, and on any device." mark for My Articles similar articles
InternetNews
March 16, 2006
Roy Mark
Feds Again Flunk Network Security A large percentage of federal agencies flunked their annual network security review under the Federal Information Security Management Act, including the Department of Homeland of Security and the Department of Defense. mark for My Articles similar articles
PC World
September 18, 2002
Peggy Watt
Uncle Sam Wants You to Defend Cyberspace National cybersecurity plan unveiled for comment, criticism, suggestions. mark for My Articles similar articles
National Defense
September 2009
Katie Breitbach
International Gateway Airports Proposed for Small Aircraft Three Department of Homeland Security agencies are collaborating on a proposal to have small aircraft entering the United States land at so-called "gateway airports" so they can be inspected before traveling to large cities. mark for My Articles similar articles
The Motley Fool
December 28, 2009
Tim Beyers
More Pain for the Airline Industry? Draconian security rules could do more harm than good. mark for My Articles similar articles
National Defense
September 2007
Breanne Wagner
Reluctance to Share Information Hampers Counterterrorism Efforts As part of an ambitious plan to improve the flow of intelligence among law enforcement agencies, the U.S. government has set up several command centers where federal, state and local officials can share information. mark for My Articles similar articles
National Defense
August 2004
Joe Pappalardo
Securitybeat Congress Rejects Post-Disaster Continuity Amendment... Homeland Defense War Game Tests Interoperability... Truck Detector Test Program Underway in El Paso... Intelligence Center Collates Transportation Data... etc. mark for My Articles similar articles
Geotimes
November 2003
Ralph J. Thompson
Civilian Agencies Implement the Bush Space Policy In April, President Bush authorized a national policy establishing guidance for federal use of commercial satellite data. Civilian agencies must now examine their needs. mark for My Articles similar articles
Reason
July 2005
Julian Sanchez
Ten Percent Solution The Transportation Security Administration's (TSA) Secure Flight passenger profiling system reforms stall at the gate: Congress established 10 criteria to ensure the program would both be effective and protect traveler privacy. A March report found that only one benchmark has been met. mark for My Articles similar articles
InternetNews
March 17, 2004
Roy Mark
House Panel Slams Federal IT Security With cyber-attacks against the government surging, U.S. agencies fail to meet the challenge. mark for My Articles similar articles
Information Today
August 6, 2012
Barbie E. Keiser
Cybersecurity and Privacy Concerns at the Highest Levels of Government Ensuring the privacy and security of personal information collected by federal government agencies and preventing cyberattacks in the future is a responsibility of government that all Americans can support. mark for My Articles similar articles
The Motley Fool
September 3, 2009
Tim Beyers
Can This Plan Save the Airlines? All big carriers save for Continental Airlines are investing in in-flight wireless access as a revenue enhancer. mark for My Articles similar articles
National Defense
May 2010
Stew Magnuson
With No Budget, Joint Federal Office Tackles High Explosives Problem The Joint Program Office for Combating Terrorist Use of Explosives recently marked its one-year anniversary and is beginning to tick off items on a long list of recommendations designed to thwart terrorists from employing bombs on U.S. soil. mark for My Articles similar articles
National Defense
May 2009
Magnuson & Rusling
Video Sharing Needed for Emergency Response The myriad of government agencies involved in an emergency need some way to see what everyone is seeing. mark for My Articles similar articles
Popular Mechanics
April 9, 2008
Barbara S. Peterson
Why U.S. Airlines Still Won't Join the Mobile Mile-High Club Airline passengers abroad could soon find themselves sitting in chatter class. In the past two weeks, regulatory authorities and individual airlines in Europe have taken steps to allow in-flight cellphone use -- not that you'll be able to phone home while flying over the United States anytime soon. mark for My Articles similar articles
National Defense
December 2012
Stew Magnuson
System Gives Nationwide, Real-Time Security Threat Updates The Department of Homeland Security has finally established its "common operating picture" -- software that gives state and local police, and other authorized organizations the ability to see the latest security threats on one computer screen. mark for My Articles similar articles
National Defense
February 2008
Lawrence P. Farrell Jr.
U.S. Has Strategy for Homeland Security, But Are We Ready? In October, the White House issued an updated "National Strategy for Homeland Security," which is intended to guide, organize and unify the nation's homeland security efforts. mark for My Articles similar articles
National Defense
August 2006
Stew Magnuson
Former staffer becomes leading DHS critic Former Department of Homeland Security Inspector General Clark Kent Ervin has emerged in recent months as one of the department's leading critics, and one with some credibility. mark for My Articles similar articles
InternetNews
May 25, 2005
Fed IT Security Spending to Jump 20% Agency spending on cybersecurity is projected to grow from $6.1 billion to $7.3 billion. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
InternetNews
May 20, 2010
Feds Seeks Blue-Sky Ideas for Cybersecurity Multiple federal agencies have established a portal to solicit help from the private sector to devise new strategies and technologies to safeguard critical data networks. mark for My Articles similar articles
Scientific American
July 2009
Eugenie Samuel Reich
Stimulus Funds for Science Raise Concern about Misconduct About $31 billion in stimulus funds will go to science. Can watchdogs keep track of those funds? mark for My Articles similar articles
AskMen.com
Mr. Mafioso
How To Make Threats The principles of negotiating with threats can be widely applied, even to business situations. mark for My Articles similar articles
IEEE Spectrum
September 2008
Robert N. Charette
Sit Back, Relax, and Enjoy the Entertainment Modern in-flight entertainment systems are more than just eye candy mark for My Articles similar articles
National Defense
December 2011
Stew Magnuson
DHS Considers Reviving Dormant Joint Requirements Council Nothing is more maddening to budget hawks and government watchdogs than two different agencies setting out to purchase the same technology in separate acquisition programs. mark for My Articles similar articles
National Defense
July 2006
Grace Jean
Central Command: Defeating Insurgency Requires Improved Information Networks For the US to defeat asymmetric attacks from small transnational groups and to win the war on terrorism will require a network of interagency efforts and information sharing. mark for My Articles similar articles
National Defense
April 2006
Grace Jean
Aviation Security Remains Under Scrutiny Aviation security measures adopted since 9/11 have not significantly made passengers safer or have been cost effective, experts contend. They also noted that many weaknesses in the previous system remain, despite billions of dollars being spent to enhance air safety. mark for My Articles similar articles
National Defense
March 2004
Geoff S. Fein
Security Beat The Departments of Homeland Security and Health and Human Services will share $275 million to expand the BioWatch program, improve a nationwide bio threat reporting system and upgrade food and animal inspections. mark for My Articles similar articles
CFO
December 1, 2006
Lori Calabro
The Office of Management & Budget's Linda Combs How the CFO Act is slowly improving the government's financial management. mark for My Articles similar articles
National Defense
October 2004
Joe Pappalardo
Security Beat Homeland Security Dept. Finances Found in Disarray... Effort Underway to Boost Bioscience Security... Corporate Supporters of Terror States Under Scrutiny... Cities Get Tutored on Disaster Communications... etc. mark for My Articles similar articles
IEEE Spectrum
September 2008
Robert N. Charette
The Psychology of Comfortable Air Travel How to create an award-winning in-flight experience mark for My Articles similar articles
Chemistry World
February 15, 2008
Rebecca Trager
Security of US Nuclear Research Facilities in Doubt Nuclear facilities at US universities and Los Alamos National Laboratory (LANL) have come under fire from a US congressional watchdog for lax security and breaches of safety rules. mark for My Articles similar articles
National Defense
December 2007
Grace Jean
First Responder Teams Eye Military Urban Trainers Threats of terrorist attacks on U.S. soil are prompting law enforcement agencies and first responders to turn to military-grade training facilities. mark for My Articles similar articles
CIO
March 1, 2001
Rebecca Lynch
Your Tax Dollars at Work? Federal agency CIOs could save you billions through supply chain automation. They don't... mark for My Articles similar articles