MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
October 2005
Joe Pappalardo
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
National Defense
February 2006
Stew Magnuson
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. mark for My Articles similar articles
National Defense
December 2007
Sandra I. Erwin
For Contractors in War Zones, Business Will Keep Growing The constant sniping in Washington about military contractors ignores the inescapable conclusion that the privatization of government functions not only is here to stay, but is going to get bigger. mark for My Articles similar articles
National Defense
December 2011
Stew Magnuson
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. mark for My Articles similar articles
InternetNews
September 7, 2010
Cybersecurity Czar: Privacy Won't Be a Casualty NSA Director Gen. Keith Alexander reaffirmed his view that protecting U.S. government, military and civilian data networks doesn't mean sacrificing citizens' right to privacy. mark for My Articles similar articles
Inc.
August 2005
David H. Freedman
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
InternetNews
January 12, 2009
Richard Adhikari
Avoiding the Most Common Programming Errors These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors. mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
National Defense
June 2013
Valerie Insinna
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. mark for My Articles similar articles
National Defense
September 2012
Dan Parson
Pentagon Struggles to Integrate Smartphones, Create Mobile Workforce Pentagon officials got a lesson in what happens when their sluggish acquisition practices go up against the commercial market's swift innovation. mark for My Articles similar articles
National Defense
June 2011
Stew Magnuson
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. mark for My Articles similar articles
Parameters
Autumn 2008
Steven L. Schooner
Why Contractor Fatalities Matter Apprising the American public that the true human cost associated with military operations includes contractors and exceeds 6,000 is critical to making informed decisions for the future. mark for My Articles similar articles
The Motley Fool
May 24, 2007
Rich Duprey
Another Tough Payday for the Military Despite persistent pay gaps for the military, legislative fixes exacerbate short-term funding problems. mark for My Articles similar articles
InternetNews
August 1, 2007
Sean Michael Kerner
NSA Honcho Advocates Security Collaboration A National Security Agency official talks what his agency is doing to secure the nation. mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
National Defense
December 2015
Lloyd McCoy Jr.
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. mark for My Articles similar articles
Parameters
Autumn 2008
Mark Cancian
Contractors: The New Element of Military Force Structure The purpose of this article is to examine what battlefield contractors do, consider how we got to the situation we are in today, and provide force planners with some useful insight regarding the future. mark for My Articles similar articles
BusinessWeek
June 28, 2004
Paul Magnusson
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. mark for My Articles similar articles
Military & Aerospace Electronics
February 2009
Courtney E. Howard
Information is under attack Malicious attacks on information and information systems occur at an alarming rate all over the world. mark for My Articles similar articles
Military & Aerospace Electronics
May 2009
Courtney E. Howard
War in the Information Age Secure operating systems and code verification tools are the front line when it comes to protecting mission-critical and classified information on today's digital battlefield. mark for My Articles similar articles
Scientific American
March 13, 2006
Daniel G. Dupont
Software Insecurity A good deal of code for some of the military's most sophisticated weapons -- fighter aircraft and missile defense systems, for example -- is written in other countries, creating an obvious risk to national security. mark for My Articles similar articles
National Defense
June 2011
Sandra I. Erwin
Cries of 'Hollow Military' Stifle Rational Debate on Future Spending President Obama has called for $400 billion in Pentagon cuts over the next 12 years, and to some defense officials and lawmakers, this is just the opening salvo of a campaign to tear down the U.S. military. mark for My Articles similar articles
National Defense
August 2010
Sandra I. Erwin
Pentagon Contractors Souring on 'Soft Power' Pentagon contractors are turning bearish on the so-called "soft power" market for non-defense work such as nation-building and post-conflict reconstruction. mark for My Articles similar articles
National Defense
August 2009
Sandra I. Erwin
Future War: How The Game is Changing "It's hard to concentrate on a grand strategy when your house is on fire," said Marine Corps Gen. James Mattis, head of U.S. Joint Forces Command. Even as they cope with the frantic demands of two major wars, military leaders say they have a clearer sense of the future than they did in the 1990s. mark for My Articles similar articles
HBS Working Knowledge
May 16, 2012
Can Decades of Military Overspending be Fixed? Costs tend to rise in all organizations unless managers and their staffs have the motivation and skill to control them. This phenomenon is analyzed during 50 years of US military overspending. mark for My Articles similar articles
Reason
November 2005
Matt Welch
Rummy's Posse The main thrust of an 1878 law -- keeping the four fighting branches of the military away from American citizens -- has stood firm. Until now. mark for My Articles similar articles
Parameters
Autumn 2007
Marc Lindemann
Civilian Contractors under Military Law The insertion of five words into Congress's fiscal year 2007 defense authorization act may now subject every civilian contractor operating in a combat zone to the discipline of the Uniform Code of Military Justice (UCMJ). mark for My Articles similar articles
National Defense
January 2009
Sandra I. Erwin
'Milspec' Technology Makes a Comeback A rising propensity to "militarize" the Defense Department's information networks will be making it more difficult for the Pentagon to take advantage of cutting-edge technologies from the commercial sector, say analysts and industry experts. mark for My Articles similar articles
National Defense
August 2014
Stew Magnuson
Cyber Labor Shortage Not What it Seems, Experts Say Only a handful of universities offering cyber security degrees are producing graduates who have "hard skills." mark for My Articles similar articles
Popular Mechanics
April 21, 2009
Glenn Derene
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. mark for My Articles similar articles
IEEE Spectrum
November 2008
Robert N. Charette
What's Wrong with Weapons Acquisitions? Escalating complexity, a shortage of trained workers, and crass politicization mean that most programs to develop new military systems fail to meet expectations. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
CRM
October 1, 2005
Marshall Lager
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. mark for My Articles similar articles
Reason
March 2002
Michael Young
Spy Watch Behind closed doors at the National Security Agency: James Bamford's Body of Secrets: Anatomy of the Ultra-Secret National Security Agency From the Cold War Through the Dawn of a New Century... mark for My Articles similar articles
National Defense
October 2004
Joe Pappalardo
Pentagon Balking at Intel Reform Recommendations Pentagon officials are publicly questioning some of the recommendations made by the National Commission on Terrorist Attacks Upon the United States. mark for My Articles similar articles
National Defense
May 2013
Sandra I. Erwin
Firms Think Twice Before Investing in DoD The Pentagon needs to get creative as it plans the weapons of the future, officials have said, and it needs private-sector help. mark for My Articles similar articles
National Defense
January 2012
Eric Beidel
Military Academies Look to Fill Nation's Cybersecurity Gaps Like West Point, the other academies recognize the sea change and are putting increased focus on their network security curriculum, both for these specialists and for the rest of the students who pass through their doors. mark for My Articles similar articles
National Defense
August 2013
Lawrence P. Farrell Jr.
Contractors Are Highly Valued Members of the National Security Team Government depends on industry to be a valued partner on the national security team. And while everyone must be vigilant, there is no truth to the myth that contractors can't be trusted or that they cost too much. mark for My Articles similar articles
National Defense
February 2009
Sandra I. Erwin
Foreign Policy Ambition Overlooks War Lessons The Obama administration has endorsed a major expansion of ground forces, and a surge in military capabilities to conduct "irregular" warfare against non-state actors. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
National Defense
January 2010
Sandra I. Erwin
Defense, Industry Upheaval Defined By 10 Key Moments Here's a look back at 10 key moments that defined the decade for the military and the defense industry. mark for My Articles similar articles
National Defense
December 2012
Sandra I. Erwin
Defense Drawdown: It's Been All Talk, Now It's Time to Walk U.S. military spending peaked in 2010 at $668 billion. It has dropped slightly since then, as the military started withdrawing troops from Iraq and Afghanistan. But real austerity has yet to come. mark for My Articles similar articles
Military & Aerospace Electronics
January 2007
Courtney Howard
Green Hills Software Introduces Secure Networking Platform Green Hills Software announced its platform for secure networking and an enhanced, 10th anniversary edition of its Integrity real-time operating system (RTOS). mark for My Articles similar articles
National Defense
March 2012
Sandra I. Erwin
The Coming Decade: A Slowdown In Spending, but No 'Procurement Holiday' Even under the worst-case scenario, defense budgets in the coming decade will be larger than they were in the last year of the Bush administration. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles