Similar Articles |
|
National Defense October 2005 Joe Pappalardo |
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. |
Military & Aerospace Electronics December 2007 Courtney E. Howard |
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
National Defense February 2006 Stew Magnuson |
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. |
National Defense December 2007 Sandra I. Erwin |
For Contractors in War Zones, Business Will Keep Growing The constant sniping in Washington about military contractors ignores the inescapable conclusion that the privatization of government functions not only is here to stay, but is going to get bigger. |
National Defense December 2011 Stew Magnuson |
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. |
InternetNews September 7, 2010 |
Cybersecurity Czar: Privacy Won't Be a Casualty NSA Director Gen. Keith Alexander reaffirmed his view that protecting U.S. government, military and civilian data networks doesn't mean sacrificing citizens' right to privacy. |
Inc. August 2005 David H. Freedman |
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
InternetNews January 12, 2009 Richard Adhikari |
Avoiding the Most Common Programming Errors These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
National Defense June 2013 Valerie Insinna |
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. |
National Defense September 2012 Dan Parson |
Pentagon Struggles to Integrate Smartphones, Create Mobile Workforce Pentagon officials got a lesson in what happens when their sluggish acquisition practices go up against the commercial market's swift innovation. |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. |
Parameters Autumn 2008 Steven L. Schooner |
Why Contractor Fatalities Matter Apprising the American public that the true human cost associated with military operations includes contractors and exceeds 6,000 is critical to making informed decisions for the future. |
The Motley Fool May 24, 2007 Rich Duprey |
Another Tough Payday for the Military Despite persistent pay gaps for the military, legislative fixes exacerbate short-term funding problems. |
InternetNews August 1, 2007 Sean Michael Kerner |
NSA Honcho Advocates Security Collaboration A National Security Agency official talks what his agency is doing to secure the nation. |
Popular Mechanics September 2008 Glenn Derene |
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
National Defense December 2015 Lloyd McCoy Jr. |
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. |
Parameters Autumn 2008 Mark Cancian |
Contractors: The New Element of Military Force Structure The purpose of this article is to examine what battlefield contractors do, consider how we got to the situation we are in today, and provide force planners with some useful insight regarding the future. |
BusinessWeek June 28, 2004 Paul Magnusson |
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. |
Military & Aerospace Electronics February 2009 Courtney E. Howard |
Information is under attack Malicious attacks on information and information systems occur at an alarming rate all over the world. |
Military & Aerospace Electronics May 2009 Courtney E. Howard |
War in the Information Age Secure operating systems and code verification tools are the front line when it comes to protecting mission-critical and classified information on today's digital battlefield. |
Scientific American March 13, 2006 Daniel G. Dupont |
Software Insecurity A good deal of code for some of the military's most sophisticated weapons -- fighter aircraft and missile defense systems, for example -- is written in other countries, creating an obvious risk to national security. |
National Defense June 2011 Sandra I. Erwin |
Cries of 'Hollow Military' Stifle Rational Debate on Future Spending President Obama has called for $400 billion in Pentagon cuts over the next 12 years, and to some defense officials and lawmakers, this is just the opening salvo of a campaign to tear down the U.S. military. |
National Defense August 2010 Sandra I. Erwin |
Pentagon Contractors Souring on 'Soft Power' Pentagon contractors are turning bearish on the so-called "soft power" market for non-defense work such as nation-building and post-conflict reconstruction. |
National Defense August 2009 Sandra I. Erwin |
Future War: How The Game is Changing "It's hard to concentrate on a grand strategy when your house is on fire," said Marine Corps Gen. James Mattis, head of U.S. Joint Forces Command. Even as they cope with the frantic demands of two major wars, military leaders say they have a clearer sense of the future than they did in the 1990s. |
HBS Working Knowledge May 16, 2012 |
Can Decades of Military Overspending be Fixed? Costs tend to rise in all organizations unless managers and their staffs have the motivation and skill to control them. This phenomenon is analyzed during 50 years of US military overspending. |
Reason November 2005 Matt Welch |
Rummy's Posse The main thrust of an 1878 law -- keeping the four fighting branches of the military away from American citizens -- has stood firm. Until now. |
Parameters Autumn 2007 Marc Lindemann |
Civilian Contractors under Military Law The insertion of five words into Congress's fiscal year 2007 defense authorization act may now subject every civilian contractor operating in a combat zone to the discipline of the Uniform Code of Military Justice (UCMJ). |
National Defense January 2009 Sandra I. Erwin |
'Milspec' Technology Makes a Comeback A rising propensity to "militarize" the Defense Department's information networks will be making it more difficult for the Pentagon to take advantage of cutting-edge technologies from the commercial sector, say analysts and industry experts. |
National Defense August 2014 Stew Magnuson |
Cyber Labor Shortage Not What it Seems, Experts Say Only a handful of universities offering cyber security degrees are producing graduates who have "hard skills." |
Popular Mechanics April 21, 2009 Glenn Derene |
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. |
IEEE Spectrum November 2008 Robert N. Charette |
What's Wrong with Weapons Acquisitions? Escalating complexity, a shortage of trained workers, and crass politicization mean that most programs to develop new military systems fail to meet expectations. |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
Reason March 2002 Michael Young |
Spy Watch Behind closed doors at the National Security Agency: James Bamford's Body of Secrets: Anatomy of the Ultra-Secret National Security Agency From the Cold War Through the Dawn of a New Century... |
National Defense October 2004 Joe Pappalardo |
Pentagon Balking at Intel Reform Recommendations Pentagon officials are publicly questioning some of the recommendations made by the National Commission on Terrorist Attacks Upon the United States. |
National Defense May 2013 Sandra I. Erwin |
Firms Think Twice Before Investing in DoD The Pentagon needs to get creative as it plans the weapons of the future, officials have said, and it needs private-sector help. |
National Defense January 2012 Eric Beidel |
Military Academies Look to Fill Nation's Cybersecurity Gaps Like West Point, the other academies recognize the sea change and are putting increased focus on their network security curriculum, both for these specialists and for the rest of the students who pass through their doors. |
National Defense August 2013 Lawrence P. Farrell Jr. |
Contractors Are Highly Valued Members of the National Security Team Government depends on industry to be a valued partner on the national security team. And while everyone must be vigilant, there is no truth to the myth that contractors can't be trusted or that they cost too much. |
National Defense February 2009 Sandra I. Erwin |
Foreign Policy Ambition Overlooks War Lessons The Obama administration has endorsed a major expansion of ground forces, and a surge in military capabilities to conduct "irregular" warfare against non-state actors. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
National Defense January 2010 Sandra I. Erwin |
Defense, Industry Upheaval Defined By 10 Key Moments Here's a look back at 10 key moments that defined the decade for the military and the defense industry. |
National Defense December 2012 Sandra I. Erwin |
Defense Drawdown: It's Been All Talk, Now It's Time to Walk U.S. military spending peaked in 2010 at $668 billion. It has dropped slightly since then, as the military started withdrawing troops from Iraq and Afghanistan. But real austerity has yet to come. |
Military & Aerospace Electronics January 2007 Courtney Howard |
Green Hills Software Introduces Secure Networking Platform Green Hills Software announced its platform for secure networking and an enhanced, 10th anniversary edition of its Integrity real-time operating system (RTOS). |
National Defense March 2012 Sandra I. Erwin |
The Coming Decade: A Slowdown In Spending, but No 'Procurement Holiday' Even under the worst-case scenario, defense budgets in the coming decade will be larger than they were in the last year of the Bush administration. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |