Similar Articles |
|
CIO June 24, 2009 Maryfran Johnson |
A "Whac-A-Mole" Approach to Security Current cybersecurity threats and responses are explored by several CIOs. |
InternetNews February 26, 2009 Richard Adhikari |
Experts Push Guidelines to Halt Data Breaches After a series of high-profile attacks and security lapses, government and private sector experts pull together a list of recommendations. |
CIO June 29, 2009 Kim S. Nash |
System Security: 5 Ways to Improve Your Defenses Against Attack A former Air Force CIO highlights practical ways to improve system and network security. |
InternetNews February 26, 2009 Richard Adhikari |
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. |
InternetNews December 8, 2008 Richard Adhikari |
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. |
Popular Mechanics April 21, 2009 Glenn Derene |
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. |
National Defense October 2015 Tim Larkins |
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. |
InternetNews May 8, 2009 Alex Goldman |
FAA's Web Security Audit: 3,857 Vulnerabilities Basic errors such as using default passwords are evident within the U.S. air traffic control system, resulting in three critical breaches in the last four years. |
National Defense August 2012 Sandra I. Erwin |
Cybersecurity Legislation: Solution or Distraction? After three years of debate and intense horse-trading, four major pieces of cybersecurity legislation have collided on Capitol Hill. Each claims to provide definitive policy and legal answers on how the United States should protect itself from crippling cyber-attacks. |
National Defense August 2011 Zhen Zhang |
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. |
InternetNews May 29, 2009 Kenneth Corbin |
Obama Moves Cybersecurity into the White House The president calls for a White House cybersecurity coordinator -- and reports that his own campaign was breached. |
InternetNews July 1, 2009 Kenneth Corbin |
U.S. Official: Cybersecurity Plans Not Just Talk NSC Cybersecurity Director Christopher Painter promises real action to protect digital infrastructure after Obama's address. |
National Defense June 2013 Stew Magnuson |
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. |
National Defense October 2013 Yasmin Tadjdeh |
Fears of Devastating Cyber-Attacks on Electric Grid, Critical Infrastructure Grow Department of Homeland Security Secretary Janet Napolitano warned that the United States faces "a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society." |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. |
CIO June 29, 2009 Kim S. Nash |
Obama's Cybersecurity Coordinator Has Broad Agenda President Obama's review of cybernet security needs provides a long list of issues to address. |
National Defense September 2010 Sandra I. Erwin |
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews May 29, 2009 Kenneth Corbin |
Obama's Cybersecurity Mandate a Bold First Step Obama's long-awaited cybersecurity announcement raises the profile of the issue, but many challenges remain. |
InternetNews April 8, 2009 Alex Goldman |
U.S. Electricity Grid Compromised The threat is real but, unfortunately, not new. What is new, say reports, is actual evidence of espionage. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
InternetNews November 17, 2009 |
U.S. Cybersecurity Can Halt 80% of Attacks at Best Senate panel probes ties between cybersecurity and terrorism as uncertainty continues about where authority should reside. |
The Motley Fool April 22, 2009 Rich Smith |
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. |
National Defense May 2010 Austin Wright |
Industry Reacts To Proposed Regulations As Congress moves forward with a long-awaited cybersecurity bill, industry leaders are voicing mixed views about the proposed measure. |
CIO January 4, 2012 Mark Rowh |
Smart Grid Security Inadequate, Threats Abound As the Stuxnet attack shows, malicious hackers "clearly have the upper hand" over power grid systems, a new study says. A lack of strict standards and a hodgepodge of products have created today's chaotic state of utility cybersecurity. |
InternetNews February 10, 2009 Kenneth Corbin |
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. |
Information Today October 20, 2015 Barbie E. Keiser |
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. |
CIO October 1, 2005 Ben Worthen |
The Sky Really Is Falling Ed Lazowska, cochairman of the President's Information Technology Advisory Committee, says that there is a looming security crisis, and the government, vendors and CIOs aren't doing enough to stop it. |
National Defense August 2011 Eric Beidel |
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. |
National Defense June 2013 Tim Larkins |
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. |
InternetNews April 24, 2009 Alex Goldman |
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. |
InternetNews February 18, 2009 Sean Michael Kerner |
Black Hat: U.S. Needs 'Cyberweapons' for Security An expert asks whether it's time for the U.S. to take aggressive measures to rein in national network security. |
New Architect January 2003 Bret A. Fausett |
Ask Not What the Internet Can Do for You Your role in national security: the government's "National Strategy to Secure Cyberspace" starts in the home with the individual user. |
InternetNews March 11, 2009 Kenneth Corbin |
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. |
National Defense April 2013 Stew Magnuson |
Cybersecurity Executive Order Can Only Do So Much; New Legislation Needed, Official Says The order called for the expansion of the Defense Industrial Base Information Sharing Program, in which companies alert the Defense Department to attacks on their systems, and it, in turn, sends out reports on the new threats to all participants. |
InternetNews March 19, 2009 Kenneth Corbin |
Experts See Shortfall in Cybersecurity Research With the nation under constant attack, witnesses call on Commerce Committee to prioritize cybersecurity and promote education in the field. |
InternetNews June 30, 2009 Kenneth Corbin |
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' |
PC Magazine July 1, 2009 Chloe Albanesius |
Obama's Cyberspace Crackdown The president lays out new online security measures. |
InternetNews March 17, 2009 Kenneth Corbin |
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. |
PC World September 18, 2002 Peggy Watt |
Uncle Sam Wants You to Defend Cyberspace National cybersecurity plan unveiled for comment, criticism, suggestions. |
CIO July 20, 2011 Michael Friedenberg |
Pundits Were Right About Mobile Cybersecurity Risks Industry pundits predicted escalating cybersecurity threats, and they were right. |
National Defense June 2013 Pankowski & Mercer |
Corporate Cybersecurity Plans Must Evolve Presidential pronouncements highlight the seriousness of cyberthreats. Companies need to develop response plans and develop a clear line of responsibility for notification of governmental authorities and the public. |
InternetNews April 2, 2009 Kenneth Corbin |
Senators Introduce Cybersecurity Overhaul Bill Sens. Rockefeller and Snowe bring forward sweeping bill to revamp federal cybersecurity operations and establish better coordination with businesses. |
Fast Company Daniel Terdiman |
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. |
CIO October 7, 2008 Gelston & Celli |
Cybersecurity, Password Recall, IT Culture and More Cybersecurity in the U.S., Tips for remembering passwords, Why IT teams need a culture overhaul, The U.S. border's database and more. |
Reason January 2009 Veronique de Rugy |
Bush's Regulatory Kiss-Off Obama's assertions to the contrary, the 43rd president was the biggest regulator since Nixon. |
InternetNews January 28, 2009 Richard Adhikari |
Napolitano Keeps DHS on the Hop With cybersecurity, information sharing and risk analysis on the agenda for next week, the new Homeland Security secretary is looking to patch holes, fast. |
Popular Mechanics August 25, 2008 |
Obama, McCain Scout High-Tech Homeland Revamp Here is a breakdown of each candidate's positions on homeland security. |
CIO October 15, 2003 Ben Worthen |
Security Alerts New warning system taps security contractors for attack data |
InternetNews January 12, 2009 Richard Adhikari |
Avoiding the Most Common Programming Errors These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors. |