MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
April 24, 2009
Alex Goldman
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. mark for My Articles similar articles
National Defense
March 2010
Anand Datla
Government Contracting Culture Impedes Progress in Cybersecurity The government is spending billions of dollars on IT products and services but does not hold its vendors accountable for cyberintrusions. mark for My Articles similar articles
National Defense
May 2010
Austin Wright
Industry Reacts To Proposed Regulations As Congress moves forward with a long-awaited cybersecurity bill, industry leaders are voicing mixed views about the proposed measure. mark for My Articles similar articles
CIO
March 30, 2015
Michael Friedenberg
Security crashes the boardroom party This sharpening of cybersecurity focus has forced corporate boards to have conversations they once considered too technical and back-office-oriented. mark for My Articles similar articles
InternetNews
May 28, 2009
Kenneth Corbin
Counting Down to White House Cyber Czar As the time draws near, many questions remain about how Obama will shake up government cybersecurity. mark for My Articles similar articles
National Defense
January 2014
Stew Magnuson
New Cyber Framework Aimed at Small, Mid-Tier Defense Companies A National Institute of Standards and Technology framework intended to help companies and organizations bolster their cybersecurity may have a big impact for small- and mid-tier defense contractors, experts said. mark for My Articles similar articles
Information Today
October 20, 2015
Barbie E. Keiser
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. mark for My Articles similar articles
The Motley Fool
April 22, 2009
Rich Smith
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. mark for My Articles similar articles
InternetNews
June 30, 2010
IT Security Still a People Problem, Experts Say Despite the best efforts of high-tech companies to deploy security defenses across public and private networks, end users often remain the weakest link. mark for My Articles similar articles
Managed Care
April 2005
Health Care Costs Remain Top Concern for CFOs Despite all the recent discussion about Social Security reform, chief financial officers in the United States say that rising health care cost remains their top concern, according to a survey. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. mark for My Articles similar articles
InternetNews
November 17, 2009
U.S. Cybersecurity Can Halt 80% of Attacks at Best Senate panel probes ties between cybersecurity and terrorism as uncertainty continues about where authority should reside. mark for My Articles similar articles
InternetNews
May 29, 2009
Kenneth Corbin
Obama Moves Cybersecurity into the White House The president calls for a White House cybersecurity coordinator -- and reports that his own campaign was breached. mark for My Articles similar articles
Entrepreneur
October 2007
C.J. Prince
I'm Outta Here With shrinking teams and growing responsibilities, CFOs have it tough these days. What can you do to keep yours from jumping ship? mark for My Articles similar articles
The Motley Fool
January 25, 2011
Bryan Hinmon
Protect Your Portfolio From Cyber Threats Defend your portfolio from The Attack of the Killer e-Tomatoes. mark for My Articles similar articles
CFO
March 1, 2012
David Rosenbaum
So, You're the Boss of the CIO. Now What? CFOs are more likely than ever to oversee IT. How much do you need to know in order to manage it effectively? mark for My Articles similar articles
InternetNews
June 25, 2010
Colleges Follow Obama's Lead on Cybersecurity President Obama has made national cybersecurity and online literacy two of the key pillars of both his domestic and national defense platform. Now universities are trying to do their part. mark for My Articles similar articles
National Defense
June 2013
Pankowski & Mercer
Corporate Cybersecurity Plans Must Evolve Presidential pronouncements highlight the seriousness of cyberthreats. Companies need to develop response plans and develop a clear line of responsibility for notification of governmental authorities and the public. mark for My Articles similar articles
IEEE Spectrum
July 2011
Robert N. Charette
More Cyberattacks or Just More Media Attention? We've failed to take cybersecurity seriously. Now we're paying the piper mark for My Articles similar articles
CIO
June 13, 2011
Bill Bulkeley
What CFOs Care About Besides Your IT Budget CFOs need to understand more than the costs and financial benefits to adopting cloud and consumer technologies. They're also on the hook to protect against risk mark for My Articles similar articles
CFO
November 1, 2009
Alix Stuart
Are You "Strategic"? CFOs have long aspired to that lofty moniker. Is the time at hand when many can lay claim to it? mark for My Articles similar articles
CIO
July 20, 2011
Michael Friedenberg
Pundits Were Right About Mobile Cybersecurity Risks Industry pundits predicted escalating cybersecurity threats, and they were right. mark for My Articles similar articles
Global Services
May 8, 2007
Imrana Khan
Compliance Inhibits F&A Outsourcing A recent study finds that the increasing compliance burden of financial execs is the biggest obstacle to finance and accounting outsourcing. mark for My Articles similar articles
CFO
September 1, 2005
Edward Teach
Apocalypse Soon What kinds of risk cause companies to fail? Why CFOs should sweat the really big stuff. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. mark for My Articles similar articles
InternetNews
December 8, 2008
Richard Adhikari
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. mark for My Articles similar articles
OCC Bulletin Updated Information Security Booklet The updated booklet addresses changes in technology, risk assessments, mitigation strategies, and regulatory guidance. mark for My Articles similar articles
CFO
August 1, 2012
Kate O'Sullivan
Muddling Through CFOs continue to hire but are less optimistic, according to the latest Duke/CFO Business Outlook Survey. mark for My Articles similar articles
CFO
April 1, 2009
Kate O'Sullivan
Happy New Year? A recent survey shows that most CFOs say the outlook remains bleak until 2010. mark for My Articles similar articles
InternetNews
July 1, 2009
Kenneth Corbin
U.S. Official: Cybersecurity Plans Not Just Talk NSC Cybersecurity Director Christopher Painter promises real action to protect digital infrastructure after Obama's address. mark for My Articles similar articles
CFO
March 1, 2010
Kate O'Sullivan
Lords of the Brass Ring The time may be right for financial chiefs to ascend to the CEO post. mark for My Articles similar articles
National Defense
September 2010
Sandra I. Erwin
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. mark for My Articles similar articles