MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
June 24, 2009
Maryfran Johnson
A "Whac-A-Mole" Approach to Security Current cybersecurity threats and responses are explored by several CIOs. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Experts Push Guidelines to Halt Data Breaches After a series of high-profile attacks and security lapses, government and private sector experts pull together a list of recommendations. mark for My Articles similar articles
CIO
June 29, 2009
Kim S. Nash
System Security: 5 Ways to Improve Your Defenses Against Attack A former Air Force CIO highlights practical ways to improve system and network security. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. mark for My Articles similar articles
InternetNews
December 8, 2008
Richard Adhikari
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. mark for My Articles similar articles
Popular Mechanics
April 21, 2009
Glenn Derene
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
InternetNews
May 8, 2009
Alex Goldman
FAA's Web Security Audit: 3,857 Vulnerabilities Basic errors such as using default passwords are evident within the U.S. air traffic control system, resulting in three critical breaches in the last four years. mark for My Articles similar articles
National Defense
August 2012
Sandra I. Erwin
Cybersecurity Legislation: Solution or Distraction? After three years of debate and intense horse-trading, four major pieces of cybersecurity legislation have collided on Capitol Hill. Each claims to provide definitive policy and legal answers on how the United States should protect itself from crippling cyber-attacks. mark for My Articles similar articles
National Defense
August 2011
Zhen Zhang
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. mark for My Articles similar articles
InternetNews
May 29, 2009
Kenneth Corbin
Obama Moves Cybersecurity into the White House The president calls for a White House cybersecurity coordinator -- and reports that his own campaign was breached. mark for My Articles similar articles
InternetNews
July 1, 2009
Kenneth Corbin
U.S. Official: Cybersecurity Plans Not Just Talk NSC Cybersecurity Director Christopher Painter promises real action to protect digital infrastructure after Obama's address. mark for My Articles similar articles
National Defense
June 2013
Stew Magnuson
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. mark for My Articles similar articles
National Defense
October 2013
Yasmin Tadjdeh
Fears of Devastating Cyber-Attacks on Electric Grid, Critical Infrastructure Grow Department of Homeland Security Secretary Janet Napolitano warned that the United States faces "a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society." mark for My Articles similar articles
National Defense
June 2011
Stew Magnuson
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. mark for My Articles similar articles
CIO
June 29, 2009
Kim S. Nash
Obama's Cybersecurity Coordinator Has Broad Agenda President Obama's review of cybernet security needs provides a long list of issues to address. mark for My Articles similar articles
National Defense
September 2010
Sandra I. Erwin
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
May 29, 2009
Kenneth Corbin
Obama's Cybersecurity Mandate a Bold First Step Obama's long-awaited cybersecurity announcement raises the profile of the issue, but many challenges remain. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
U.S. Electricity Grid Compromised The threat is real but, unfortunately, not new. What is new, say reports, is actual evidence of espionage. mark for My Articles similar articles
National Defense
December 2013
Yasmin Tadjdeh
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. mark for My Articles similar articles
InternetNews
November 17, 2009
U.S. Cybersecurity Can Halt 80% of Attacks at Best Senate panel probes ties between cybersecurity and terrorism as uncertainty continues about where authority should reside. mark for My Articles similar articles
The Motley Fool
April 22, 2009
Rich Smith
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. mark for My Articles similar articles
National Defense
May 2010
Austin Wright
Industry Reacts To Proposed Regulations As Congress moves forward with a long-awaited cybersecurity bill, industry leaders are voicing mixed views about the proposed measure. mark for My Articles similar articles
CIO
January 4, 2012
Mark Rowh
Smart Grid Security Inadequate, Threats Abound As the Stuxnet attack shows, malicious hackers "clearly have the upper hand" over power grid systems, a new study says. A lack of strict standards and a hodgepodge of products have created today's chaotic state of utility cybersecurity. mark for My Articles similar articles
InternetNews
February 10, 2009
Kenneth Corbin
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. mark for My Articles similar articles
Information Today
October 20, 2015
Barbie E. Keiser
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. mark for My Articles similar articles
CIO
October 1, 2005
Ben Worthen
The Sky Really Is Falling Ed Lazowska, cochairman of the President's Information Technology Advisory Committee, says that there is a looming security crisis, and the government, vendors and CIOs aren't doing enough to stop it. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles similar articles
InternetNews
April 24, 2009
Alex Goldman
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. mark for My Articles similar articles
InternetNews
February 18, 2009
Sean Michael Kerner
Black Hat: U.S. Needs 'Cyberweapons' for Security An expert asks whether it's time for the U.S. to take aggressive measures to rein in national network security. mark for My Articles similar articles
New Architect
January 2003
Bret A. Fausett
Ask Not What the Internet Can Do for You Your role in national security: the government's "National Strategy to Secure Cyberspace" starts in the home with the individual user. mark for My Articles similar articles
InternetNews
March 11, 2009
Kenneth Corbin
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. mark for My Articles similar articles
National Defense
April 2013
Stew Magnuson
Cybersecurity Executive Order Can Only Do So Much; New Legislation Needed, Official Says The order called for the expansion of the Defense Industrial Base Information Sharing Program, in which companies alert the Defense Department to attacks on their systems, and it, in turn, sends out reports on the new threats to all participants. mark for My Articles similar articles
InternetNews
March 19, 2009
Kenneth Corbin
Experts See Shortfall in Cybersecurity Research With the nation under constant attack, witnesses call on Commerce Committee to prioritize cybersecurity and promote education in the field. mark for My Articles similar articles
InternetNews
June 30, 2009
Kenneth Corbin
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' mark for My Articles similar articles
PC Magazine
July 1, 2009
Chloe Albanesius
Obama's Cyberspace Crackdown The president lays out new online security measures. mark for My Articles similar articles
InternetNews
March 17, 2009
Kenneth Corbin
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. mark for My Articles similar articles
PC World
September 18, 2002
Peggy Watt
Uncle Sam Wants You to Defend Cyberspace National cybersecurity plan unveiled for comment, criticism, suggestions. mark for My Articles similar articles
CIO
July 20, 2011
Michael Friedenberg
Pundits Were Right About Mobile Cybersecurity Risks Industry pundits predicted escalating cybersecurity threats, and they were right. mark for My Articles similar articles
National Defense
June 2013
Pankowski & Mercer
Corporate Cybersecurity Plans Must Evolve Presidential pronouncements highlight the seriousness of cyberthreats. Companies need to develop response plans and develop a clear line of responsibility for notification of governmental authorities and the public. mark for My Articles similar articles
InternetNews
April 2, 2009
Kenneth Corbin
Senators Introduce Cybersecurity Overhaul Bill Sens. Rockefeller and Snowe bring forward sweeping bill to revamp federal cybersecurity operations and establish better coordination with businesses. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
CIO
October 7, 2008
Gelston & Celli
Cybersecurity, Password Recall, IT Culture and More Cybersecurity in the U.S., Tips for remembering passwords, Why IT teams need a culture overhaul, The U.S. border's database and more. mark for My Articles similar articles
Reason
January 2009
Veronique de Rugy
Bush's Regulatory Kiss-Off Obama's assertions to the contrary, the 43rd president was the biggest regulator since Nixon. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Napolitano Keeps DHS on the Hop With cybersecurity, information sharing and risk analysis on the agenda for next week, the new Homeland Security secretary is looking to patch holes, fast. mark for My Articles similar articles
Popular Mechanics
August 25, 2008
Obama, McCain Scout High-Tech Homeland Revamp Here is a breakdown of each candidate's positions on homeland security. mark for My Articles similar articles
CIO
October 15, 2003
Ben Worthen
Security Alerts New warning system taps security contractors for attack data mark for My Articles similar articles
InternetNews
January 12, 2009
Richard Adhikari
Avoiding the Most Common Programming Errors These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors. mark for My Articles similar articles