Similar Articles |
|
National Defense July 2012 Stew Magnuson |
Stopping the Chinese Hacking Onslaught Cyber Command Commander Army Gen. Keith Alexander last year called the cyber-espionage being conducted against U.S. companies the largest transfer of intellectual property from one nation to another in the history of the world. |
National Defense December 2015 Lloyd McCoy Jr. |
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. |
National Defense April 2013 Stew Magnuson |
Cybersecurity Executive Order Can Only Do So Much; New Legislation Needed, Official Says The order called for the expansion of the Defense Industrial Base Information Sharing Program, in which companies alert the Defense Department to attacks on their systems, and it, in turn, sends out reports on the new threats to all participants. |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. |
National Defense June 2013 Stew Magnuson |
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. |
InternetNews May 1, 2009 Alex Goldman |
Defense Industry Data Needs Its Own Defenses The U.S. military only recently began to coordinate cybersecurity with private companies. |
National Defense December 2011 Stew Magnuson |
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
National Defense January 2014 Stew Magnuson |
New Cyber Framework Aimed at Small, Mid-Tier Defense Companies A National Institute of Standards and Technology framework intended to help companies and organizations bolster their cybersecurity may have a big impact for small- and mid-tier defense contractors, experts said. |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. |
National Defense August 2012 Sandra I. Erwin |
Cybersecurity Legislation: Solution or Distraction? After three years of debate and intense horse-trading, four major pieces of cybersecurity legislation have collided on Capitol Hill. Each claims to provide definitive policy and legal answers on how the United States should protect itself from crippling cyber-attacks. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
National Defense January 2016 Allyson Versprille |
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. |
InternetNews December 7, 2004 Roy Mark |
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
InternetNews March 23, 2010 |
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
CIO August 27, 2010 Kim S. Nash |
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. |
Bank Systems & Technology May 20, 2010 Penny Crosman |
BofA Hires Data Security Czar Gregory Garcia, former assistant secretary for the Office of Cybersecurity and Communications in the U.S. Department of Homeland Security, to lead bank efforts to keep data secure. |
National Defense October 2015 Tim Larkins |
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. |
InternetNews July 14, 2005 Roy Mark |
Cyber Security Gets Limelight in DHS Reorg Chertoff's organizational changes call for new cyber security position and increased information sharing. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
InternetNews April 24, 2009 Alex Goldman |
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. |
CIO September 1, 2005 Grant Gross |
DHS Revamp Targets IT Cybersecurity The U.S. Department of Homeland Security announced a new position of assistant secretary for cyber and telecommunications security, thereby raising the standing of the cybersecurity chief on its organizational chart. |
InternetNews November 17, 2009 |
U.S. Cybersecurity Can Halt 80% of Attacks at Best Senate panel probes ties between cybersecurity and terrorism as uncertainty continues about where authority should reside. |
InternetNews March 5, 2010 |
FBI Director Seeks Industry Help on Cybersecurity In an address at the annual RSA show, FBI Director Robert Mueller outlines challenges the agency has in fighting cyber crime, seeks broader partnerships with private-sector firms. |
InternetNews October 27, 2010 |
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. |
InternetNews January 15, 2010 Larry Barrett |
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats. |
National Defense November 2015 Tomas O'Keefe |
Three Homeland Security Agencies to Watch Knowing where to target sales activities as well as the challenges facing homeland security should help you identify existing opportunities to support DHS to ensure the safety and security of the American public. |
InternetNews May 19, 2005 Roy Mark |
House Approves Cybersecurity Promotion Legislation aims to raise profile of protecting federal networks from cyber attacks. |
Bank Technology News May 1, 2008 Rebecca Sausner |
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. |
National Defense June 2013 Tim Larkins |
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. |
InternetNews June 26, 2009 Kenneth Corbin |
Feds Mulling Incentives for Secure Software Tax breaks for better software? That's one idea on the table as officials work to flesh out government role in public-private partnerships. |
InternetNews March 17, 2009 Kenneth Corbin |
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. |
The Motley Fool April 22, 2009 Rich Smith |
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. |
InternetNews March 24, 2010 |
U.S. Gov Says Cyber Security Experts in Demand Universities aren't graduating cybersecurity experts fast enough to help the government head off security threats, according to the Department of Homeland Security's Cybersecurity director. |
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. |
InternetNews March 11, 2009 Kenneth Corbin |
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. |
InternetNews November 11, 2005 Roy Mark |
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. |
National Defense June 2015 Sandra I. Erwin |
Industry Tees Up Policy Issues for 2016 The Beltway establishment is looking to a new administration to take on issues that have long been festering among defense contractors. |
InternetNews September 30, 2009 |
FCC Panel: Cybersecurity Needs Incentives Cybersecurity experts warn FCC of market challenges to shoring up broadband networks. |
InternetNews February 17, 2005 Michael Singer |
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. |
InternetNews October 21, 2010 |
Cybersecurity Field Needs to 'Professionalize' A panel of experts agreed there's a talent shortfall in cybersecurity, particularly in the government sector, and it's much broader than just technical expertise. |
InternetNews May 3, 2010 |
Cybersecurity Seen Falling Short on Collaboration Across businesses and governments, one country to the next, the fight against hackers and cyber-attackers is a multi-front war, and a new global survey suggests that people just aren't talking to each other. |
InternetNews May 4, 2009 Kenneth Corbin |
Federal Cybersecurity a Tough Balance to Strike House panel seeks answers, advice from cybersecurity experts as government mulls major reorganization. |
InternetNews April 8, 2010 |
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. |