MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
September 15, 2009
Federal Government IT Heads for the Clouds Vivek Kundra outlines broad cloud-computing initiative featuring online storefront for federal CIOs to browse commercial cloud offerings. mark for My Articles similar articles
CIO
September 22, 2008
C.G. Lynch
Fighting Government Waste One Google App At a Time The Washington D.C. government is migrating its 38,000 employees over to Gmail and Google Apps, which it plans to use for document sharing, spreadsheets and as a wiki. Here's a look at how and why, from cost to continuity. mark for My Articles similar articles
InternetNews
April 22, 2010
White House To Modernize Cybersecurity Reports New directive requires government agencies to get with the times and abandon paper-based reporting for real-time digital updates on all potential cyber-security threats. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
InternetNews
March 25, 2010
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. mark for My Articles similar articles
InternetNews
March 12, 2009
Kenneth Corbin
Obama CIO: Government Can Lead in IT Vivek Kundra pledges to remake the federal IT portfolio in the mold of the private sector. mark for My Articles similar articles
InternetNews
October 27, 2010
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. mark for My Articles similar articles
InternetNews
July 28, 2010
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. mark for My Articles similar articles
Food Processing
September 2013
Anthony Hernandez
Protecting Your Data in a Mobile World If food companies adopt a bring-your-own-device approach, they need to establish clear policies and implement IT security controls. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
InternetNews
November 23, 2009
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds. mark for My Articles similar articles
InternetNews
September 17, 2009
Google Docs Gains Momentum in Enterprise IDC finds that workers are embracing cloud-based Docs as a complement to ubiquitous Microsoft Office applications. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
U.S. Banker
February 2009
Glen Fest
What Obama's CTO Heralds Whoever is ultimately chosen as Obama's CTO will be expected to be more than the nation's leading Friendster: he or she will take on a newly created Cabinet post with a mandate to lead an overhaul of the country's technology infrastructure, policy and strategy. mark for My Articles similar articles
InternetNews
April 28, 2010
Obama Tech Chiefs Post Agencies' e-Gov Ratings Federal CTO Chopra and CIO Kundra post score card evaluating agencies' open government plans as a pair of studies surface describing increasing citizen engagement with government online. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
Wired
Nicholas Thompson
And Data for All: Why Obama's Geeky New CIO Wants to Put All Gov't Info Online The Obama administration's most radical idea may also be its geekiest: Make nearly every hidden government spreadsheet and buried statistic available online, all in one place. mark for My Articles similar articles
InternetNews
March 26, 2010
Survey: Security is the Top Priority for CEOs Study finds that 76 percent of C-level executives now say that securing their business-critical apps is the most important aspect of their data protection program. mark for My Articles similar articles
InternetNews
March 5, 2009
Sean Gallagher
Obama Names Federal Government's First CIO Vivek Kundra will be responsible for managing the government's entire technology portfolio. mark for My Articles similar articles
InternetNews
June 22, 2010
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
Information Today
February 14, 2008
SIIA Releases Survey Results on Business Use of Web 2.0 Technologies Business use of Web 2.0 technologies such as wikis, blogs, social networking, and user-generated content are increasing. mark for My Articles similar articles
InternetNews
July 1, 2010
Federal IT's Cloud Efforts Probed by Congress U.S. CIO Vivek Kundra and others give an update on the progress, pros and cons of government's move to the cloud, as Congress weighs the benefits of data center consolidation against security considerations. mark for My Articles similar articles
CIO
October 15, 2009
Bill Brenner
Why Security Matters Now Social networking and cloud computing security threats abound, our annual Global Information Security Survey finds, making information security important once again to business leaders. mark for My Articles similar articles
InternetNews
July 1, 2009
Kenneth Corbin
U.S. Official: Cybersecurity Plans Not Just Talk NSC Cybersecurity Director Christopher Painter promises real action to protect digital infrastructure after Obama's address. mark for My Articles similar articles
National Defense
December 2013
Yasmin Tadjdeh
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. mark for My Articles similar articles
National Defense
December 2015
Lloyd McCoy Jr.
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. mark for My Articles similar articles
InternetNews
September 15, 2009
Users Prefer Device Fingerprinting to Passwords Study finds 70 percent of respondents say they'd be willing to have their PCs and mobile devices authenticated by an online merchant before completing a transaction. mark for My Articles similar articles
InternetNews
January 14, 2010
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. mark for My Articles similar articles
InternetNews
July 13, 2009
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. mark for My Articles similar articles
InternetNews
April 7, 2010
Government Tech Looks to the Cloud Federal CIO Vivek Kundra outlines why it's critical for the U.S. government to transition its infrastructure to cloud models. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
Wall Street & Technology
February 25, 2008
Melanie Rodier
Ineffective Access Management Poses Risk to Businesses A new study shows that the majority of IT professionals view collaboration among business units and audit, compliance and IT security functions as critical to achieving good access management, but most feel it isn't happening. mark for My Articles similar articles
InternetNews
April 30, 2009
Kenneth Corbin
White House's New CIO Talks Ending IT Waste Settling into new White House gig, Vivek Kundra hopes to curb mistakes of the past on the path to government 2.0. mark for My Articles similar articles
The Motley Fool
November 14, 2011
Katie Spence
Cyber Attacks Capable of Crashing the U.S. Economy? With cyber attacks becoming more prevalent, these companies are stepping in to provide solutions. mark for My Articles similar articles
InternetNews
August 4, 2009
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. mark for My Articles similar articles
InternetNews
January 15, 2010
Larry Barrett
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
CIO
March 18, 2009
Michael Friedenberg
Obama and IT President Obama signals the power of IT. mark for My Articles similar articles
InternetNews
July 29, 2010
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks. mark for My Articles similar articles
Bank Systems & Technology
March 30, 2007
J. Nicholas Hoover
Adoption of Web 2.0 Is Taking Off, But Some Firms Are Still Reluctant Business technologists are concerned about security, return on investment and their staffs' skill in implementing and integrating new Web tools. While some financial services companies are plunging into Enterprise 2.0, it still is an emerging technology. mark for My Articles similar articles
InternetNews
June 16, 2009
Alex Goldman
Federal CIO: U.S. Government Needs New Software Innovative software, including cloud computing technology, will bring all kinds of data to the Internet. mark for My Articles similar articles
InternetNews
October 22, 2009
Hope for the Federal Cloud? Panel of cloud experts talk of the administration's challenge to move to the next great computing front. mark for My Articles similar articles
InternetNews
April 15, 2010
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. mark for My Articles similar articles
InternetNews
February 17, 2010
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. mark for My Articles similar articles
InternetNews
May 28, 2009
Kenneth Corbin
Counting Down to White House Cyber Czar As the time draws near, many questions remain about how Obama will shake up government cybersecurity. mark for My Articles similar articles
InternetNews
October 2, 2007
Andy Patrizio
Report: Consumers Not as Safe Online As They Think McAfee survey finds many computers are far less secure than their owners believe. mark for My Articles similar articles