Similar Articles |
|
National Defense December 2013 Valerie Insinna |
Cutting Costs a Top Goal for Government Network Managers Information technology leaders in federal and local government view budget constraints as an even bigger threat to infrastructure than cyber-attacks, according to a Cisco-sponsored survey conducted in September. |
InternetNews October 13, 2010 |
DHS Touts Cybersecurity Awareness Campaign To mark October as national cybersecurity awareness month, the Department of Homeland Security is holding a nationwide campaign to promote safe computing. |
InternetNews June 17, 2010 |
Can the Feds Keep Data Private on the Cloud? The White House IT team has made its marching orders to the agencies clear: the cloud is the way to go. But with so much data in play, will privacy fall by the wayside? |
InternetNews November 10, 2009 |
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. |
National Defense September 2012 Stew Magnuson |
Firms That Help DHS Save Money Will Make Money, Analysts Say The days of big price tag, cutting-edge technology acquisitions at the Department of Homeland Security are over. |
National Defense November 2013 Stew Magnuson |
Companies Ill-Prepared to Fend Off Insider Threats Two high-profile cases are putting a spotlight on insider threats in the private sector, particularly companies that do business with the Defense Department, intelligence agencies and other government organizations. |
InternetNews October 8, 2010 |
Cloud, Mobile Top Developers' Priorities: IBM In a new survey, IBM's developerWorks unit has found that more than half of IT professionals expect mobile software applications to vault past conventional computing platforms in the next five years. |
National Defense December 2012 Stew Magnuson |
System Gives Nationwide, Real-Time Security Threat Updates The Department of Homeland Security has finally established its "common operating picture" -- software that gives state and local police, and other authorized organizations the ability to see the latest security threats on one computer screen. |
National Defense May 2015 Allyson Versprille |
DHS Rolls Out Cyber Security Program for Federal Agencies Phase one of the Department of Homeland Security's Continuous Diagnostics and Mitigation program will be completed by the end of summer, said an executive at Dell Inc., a technology supplier to the competing contractors. |
InternetNews March 11, 2009 Kenneth Corbin |
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. |
The Motley Fool December 31, 2010 Andrew Bond |
Security Emerges From the Cloud The proliferation of cloud computing and concerns about safety should boost IT security stocks. |
National Defense May 2010 Stew Magnuson |
Technology Directorate To Help DHS Agencies Write Requirements The Department of Homeland Security during its first eight years has had a poor reputation when it comes to fielding new technologies. DHS' science and technology directorate leader says her organization can help solve some of these acquisition problems. |
National Defense June 2013 Tim Larkins |
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. |
InternetNews March 13, 2009 Kenneth Corbin |
Feds Eye Cybersecurity, Networking Projects Officials from agency responsible for government cybersecurity and interoperable communications networks say their first obligation is to the people in the field. |
InternetNews February 26, 2009 Richard Adhikari |
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. |
National Defense February 2011 Stew Magnuson |
DHS Technology Directorate Undergoes Major Changes Department of Homeland Security Undersecretary for Science and Technology Tara O'Toole has radically restructured her division in an effort to rapidly field devices needed by DHS agencies as well as first responders. |
National Defense November 2015 Tomas O'Keefe |
Three Homeland Security Agencies to Watch Knowing where to target sales activities as well as the challenges facing homeland security should help you identify existing opportunities to support DHS to ensure the safety and security of the American public. |
National Defense August 2011 Eric Beidel |
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. |
InternetNews October 14, 2010 |
Defense, Homeland Security Team in Cyber Push Top military and civilian agencies join forces to pool resources and share personnel in the ongoing struggle to preempt and combat threats against U.S. digital systems. |
Bank Technology News August 2009 Rebecca Sausner |
New BI's in the Clouds The movement of enterprise IT, including analytics, to the cloud follows the progression of applications as they migrate outside banks' firewalls. |
InternetNews January 28, 2009 Richard Adhikari |
Napolitano Keeps DHS on the Hop With cybersecurity, information sharing and risk analysis on the agenda for next week, the new Homeland Security secretary is looking to patch holes, fast. |
Popular Mechanics April 21, 2009 Glenn Derene |
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. |
National Defense February 2008 Lawrence P. Farrell Jr. |
U.S. Has Strategy for Homeland Security, But Are We Ready? In October, the White House issued an updated "National Strategy for Homeland Security," which is intended to guide, organize and unify the nation's homeland security efforts. |
National Defense February 2007 Stew Magnuson |
Funding, Numbers of State Fusion Centers Uncertain So far, there is no congressional mandate for state or local agencies to organize intelligence fusion centers such as the one found in Maryland. There are also no guarantees that the federal grants helping fund such centers will last. |
InternetNews April 8, 2008 David Needle |
Chertoff Calls For Private Sector to Help Secure 'Net At the RSA conference, the homeland security chief lays out an agenda requiring corporate and individual participation. But is it money well spent? |
National Defense September 2007 Breanne Wagner |
Reluctance to Share Information Hampers Counterterrorism Efforts As part of an ambitious plan to improve the flow of intelligence among law enforcement agencies, the U.S. government has set up several command centers where federal, state and local officials can share information. |
National Defense May 2013 Yasmin Tadjdeh |
DHS Beefs Up Cybersecurity Efforts With Monitoring, Authentication Tools The Department of Homeland Security is increasing its cybersecurity presence by using continuous monitoring tools and improving verifying measures, said a top department official. |
Military & Aerospace Electronics May 2007 |
DHS Selects Govplace IT Offerings for FirstSource Program Govplace will provide IT solutions for the U.S. Department of Homeland Security (DHS)'s new FirstSource program. The program is designed to consolidate information technology (IT) procurement across the department's agencies. |
InternetNews May 19, 2005 Roy Mark |
House Approves Cybersecurity Promotion Legislation aims to raise profile of protecting federal networks from cyber attacks. |
National Defense October 2015 Tim Larkins |
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. |
National Defense September 2010 Sandra I. Erwin |
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. |
National Defense September 2004 Lawrence P. Farrell, Jr. |
Department of Homeland Security on the Right Track The Department of Homeland Security is taking aggressive steps to help the nation's state and local governments, as well as first responders, prepare for the worst-case scenario. |
National Defense July 2014 Stew Magnuson |
Funding Not Following Concerns About Insider Threats Spies, disgruntled workers and intellectual property thieves have always been a problem in both government and private sector organizations. |
InternetNews February 10, 2009 Kenneth Corbin |
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. |
Military & Aerospace Electronics July 2005 John McHale |
Idaho National Laboratory receives second round of funding for cyber threat reduction program Idaho's Control System Security Center will receive $11.7 million in 2005 to continue its efforts to secure the computer-aided control systems that operate the nation's critical infrastructures. |
InternetNews April 21, 2005 Roy Mark |
House Panel Pushes Cybersecurity Post New legislation raises profile of the individual responsible for securing the nation against digital attacks. |
The Motley Fool December 28, 2011 Dan Radovsky |
Brocade's Roller-Coaster Year Can Brocade recover from its midyear vertigo? |
InternetNews January 12, 2010 |
What are the Top Trends for SMBs in 2010? We've polished up our crystal ball to see what technology trends small business entrepreneurs should pay attention to in 2010. |
National Defense June 2004 Harold Kennedy |
Blueprint For Homeland Security The Defense Department is working on a comprehensive homeland defense strategy that will detail the Pentagon's emerging role in protecting the United States from terrorist attack |
National Defense February 2016 Chris Wiedemann |
Finance, Health Care, Agriculture Play Key Roles in Critical Infrastructure Protection Anyone looking to support the mission of critical infrastructure protection outside of DHS should be reaching out to the Departments of Treasury, Health and Human Services, and Agriculture. |
The Motley Fool September 7, 2011 Anders Bylund |
Brocade Communications Systems Jumped: What You Need to Know Is this meaningful? Or just another movement? |
CIO September 15, 2005 Scott Berinato |
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. |
National Defense February 2015 Sarah Sicard |
Experts: Thwarting Insider Threats Takes A Holistic Approach Insider threats, whether they are foreign spies, disgruntled employees or embezzlers, can't be stopped with software alone, experts at a cyber security summit recently warned. |
PHONE+ |
Countering Objections to Cloud Computing Armed with the right information, solution providers can counter common objections to cloud computing sales. |
Fast Company Christina Farr |
How Effective Is It To Vet The Social Media Activity Of Visa Applicants? Technology company employees are skeptical that government pilot programs to scrutinize visa applicants' social media activity will be effective at rooting out potential terrorists or terrorist sympathizers. |
InternetNews September 16, 2004 Roy Mark |
Lawmakers Call for Cybersecurity Enhancements As the 108th Congress scrambles in its final days to address homeland security issues, U.S. Reps. Mac Thornberry (R-Texas) and Zoe Lofgren (D-Calif.) are focusing on the state of U.S. cybersecurity. |
National Defense January 2012 Stew Magnuson |
DHS Science and Technology Directorate Faces Near Annihilation The budget being proposed by the House for the Department of Homeland Security's Science and Technology Directorate is so bare bones it would essentially terminate most of the research and development in the department, the head of the division said. |
National Defense July 2006 Harold Kennedy |
Biometric Check on U.S. Visitors Drawing Criticism A controversial effort by the Department of Homeland security to create a biometric computer system to keep tabs on all foreigners entering and leaving the country is drawing increasing flak at home and abroad. |
National Defense January 2010 Stew Magnuson |
DHS Intelligence Nominee to Revamp Beleaguered Office's Hiring Practices Caryn Wagner, nominee to be undersecretary for intelligence and analysis at the Department of Homeland Security, said she will try to improve the low morale, high turnover and slow hiring process at the organization. |
InternetNews July 8, 2010 |
Feds Work for Private-Sector Cybersecurity Deal Public-private partnerships are viewed as the way to go for proper cybersecurity, but experts warn there are still pitfalls. |