MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
December 2013
Valerie Insinna
Cutting Costs a Top Goal for Government Network Managers Information technology leaders in federal and local government view budget constraints as an even bigger threat to infrastructure than cyber-attacks, according to a Cisco-sponsored survey conducted in September. mark for My Articles similar articles
InternetNews
October 13, 2010
DHS Touts Cybersecurity Awareness Campaign To mark October as national cybersecurity awareness month, the Department of Homeland Security is holding a nationwide campaign to promote safe computing. mark for My Articles similar articles
InternetNews
June 17, 2010
Can the Feds Keep Data Private on the Cloud? The White House IT team has made its marching orders to the agencies clear: the cloud is the way to go. But with so much data in play, will privacy fall by the wayside? mark for My Articles similar articles
InternetNews
November 10, 2009
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. mark for My Articles similar articles
National Defense
September 2012
Stew Magnuson
Firms That Help DHS Save Money Will Make Money, Analysts Say The days of big price tag, cutting-edge technology acquisitions at the Department of Homeland Security are over. mark for My Articles similar articles
National Defense
November 2013
Stew Magnuson
Companies Ill-Prepared to Fend Off Insider Threats Two high-profile cases are putting a spotlight on insider threats in the private sector, particularly companies that do business with the Defense Department, intelligence agencies and other government organizations. mark for My Articles similar articles
InternetNews
October 8, 2010
Cloud, Mobile Top Developers' Priorities: IBM In a new survey, IBM's developerWorks unit has found that more than half of IT professionals expect mobile software applications to vault past conventional computing platforms in the next five years. mark for My Articles similar articles
National Defense
December 2012
Stew Magnuson
System Gives Nationwide, Real-Time Security Threat Updates The Department of Homeland Security has finally established its "common operating picture" -- software that gives state and local police, and other authorized organizations the ability to see the latest security threats on one computer screen. mark for My Articles similar articles
National Defense
May 2015
Allyson Versprille
DHS Rolls Out Cyber Security Program for Federal Agencies Phase one of the Department of Homeland Security's Continuous Diagnostics and Mitigation program will be completed by the end of summer, said an executive at Dell Inc., a technology supplier to the competing contractors. mark for My Articles similar articles
InternetNews
March 11, 2009
Kenneth Corbin
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. mark for My Articles similar articles
The Motley Fool
December 31, 2010
Andrew Bond
Security Emerges From the Cloud The proliferation of cloud computing and concerns about safety should boost IT security stocks. mark for My Articles similar articles
National Defense
May 2010
Stew Magnuson
Technology Directorate To Help DHS Agencies Write Requirements The Department of Homeland Security during its first eight years has had a poor reputation when it comes to fielding new technologies. DHS' science and technology directorate leader says her organization can help solve some of these acquisition problems. mark for My Articles similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles similar articles
InternetNews
March 13, 2009
Kenneth Corbin
Feds Eye Cybersecurity, Networking Projects Officials from agency responsible for government cybersecurity and interoperable communications networks say their first obligation is to the people in the field. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. mark for My Articles similar articles
National Defense
February 2011
Stew Magnuson
DHS Technology Directorate Undergoes Major Changes Department of Homeland Security Undersecretary for Science and Technology Tara O'Toole has radically restructured her division in an effort to rapidly field devices needed by DHS agencies as well as first responders. mark for My Articles similar articles
National Defense
November 2015
Tomas O'Keefe
Three Homeland Security Agencies to Watch Knowing where to target sales activities as well as the challenges facing homeland security should help you identify existing opportunities to support DHS to ensure the safety and security of the American public. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
InternetNews
October 14, 2010
Defense, Homeland Security Team in Cyber Push Top military and civilian agencies join forces to pool resources and share personnel in the ongoing struggle to preempt and combat threats against U.S. digital systems. mark for My Articles similar articles
Bank Technology News
August 2009
Rebecca Sausner
New BI's in the Clouds The movement of enterprise IT, including analytics, to the cloud follows the progression of applications as they migrate outside banks' firewalls. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Napolitano Keeps DHS on the Hop With cybersecurity, information sharing and risk analysis on the agenda for next week, the new Homeland Security secretary is looking to patch holes, fast. mark for My Articles similar articles
Popular Mechanics
April 21, 2009
Glenn Derene
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. mark for My Articles similar articles
National Defense
February 2008
Lawrence P. Farrell Jr.
U.S. Has Strategy for Homeland Security, But Are We Ready? In October, the White House issued an updated "National Strategy for Homeland Security," which is intended to guide, organize and unify the nation's homeland security efforts. mark for My Articles similar articles
National Defense
February 2007
Stew Magnuson
Funding, Numbers of State Fusion Centers Uncertain So far, there is no congressional mandate for state or local agencies to organize intelligence fusion centers such as the one found in Maryland. There are also no guarantees that the federal grants helping fund such centers will last. mark for My Articles similar articles
InternetNews
April 8, 2008
David Needle
Chertoff Calls For Private Sector to Help Secure 'Net At the RSA conference, the homeland security chief lays out an agenda requiring corporate and individual participation. But is it money well spent? mark for My Articles similar articles
National Defense
September 2007
Breanne Wagner
Reluctance to Share Information Hampers Counterterrorism Efforts As part of an ambitious plan to improve the flow of intelligence among law enforcement agencies, the U.S. government has set up several command centers where federal, state and local officials can share information. mark for My Articles similar articles
National Defense
May 2013
Yasmin Tadjdeh
DHS Beefs Up Cybersecurity Efforts With Monitoring, Authentication Tools The Department of Homeland Security is increasing its cybersecurity presence by using continuous monitoring tools and improving verifying measures, said a top department official. mark for My Articles similar articles
Military & Aerospace Electronics
May 2007
DHS Selects Govplace IT Offerings for FirstSource Program Govplace will provide IT solutions for the U.S. Department of Homeland Security (DHS)'s new FirstSource program. The program is designed to consolidate information technology (IT) procurement across the department's agencies. mark for My Articles similar articles
InternetNews
May 19, 2005
Roy Mark
House Approves Cybersecurity Promotion Legislation aims to raise profile of protecting federal networks from cyber attacks. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
National Defense
September 2010
Sandra I. Erwin
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. mark for My Articles similar articles
National Defense
September 2004
Lawrence P. Farrell, Jr.
Department of Homeland Security on the Right Track The Department of Homeland Security is taking aggressive steps to help the nation's state and local governments, as well as first responders, prepare for the worst-case scenario. mark for My Articles similar articles
National Defense
July 2014
Stew Magnuson
Funding Not Following Concerns About Insider Threats Spies, disgruntled workers and intellectual property thieves have always been a problem in both government and private sector organizations. mark for My Articles similar articles
InternetNews
February 10, 2009
Kenneth Corbin
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. mark for My Articles similar articles
Military & Aerospace Electronics
July 2005
John McHale
Idaho National Laboratory receives second round of funding for cyber threat reduction program Idaho's Control System Security Center will receive $11.7 million in 2005 to continue its efforts to secure the computer-aided control systems that operate the nation's critical infrastructures. mark for My Articles similar articles
InternetNews
April 21, 2005
Roy Mark
House Panel Pushes Cybersecurity Post New legislation raises profile of the individual responsible for securing the nation against digital attacks. mark for My Articles similar articles
The Motley Fool
December 28, 2011
Dan Radovsky
Brocade's Roller-Coaster Year Can Brocade recover from its midyear vertigo? mark for My Articles similar articles
InternetNews
January 12, 2010
What are the Top Trends for SMBs in 2010? We've polished up our crystal ball to see what technology trends small business entrepreneurs should pay attention to in 2010. mark for My Articles similar articles
National Defense
June 2004
Harold Kennedy
Blueprint For Homeland Security The Defense Department is working on a comprehensive homeland defense strategy that will detail the Pentagon's emerging role in protecting the United States from terrorist attack mark for My Articles similar articles
National Defense
February 2016
Chris Wiedemann
Finance, Health Care, Agriculture Play Key Roles in Critical Infrastructure Protection Anyone looking to support the mission of critical infrastructure protection outside of DHS should be reaching out to the Departments of Treasury, Health and Human Services, and Agriculture. mark for My Articles similar articles
The Motley Fool
September 7, 2011
Anders Bylund
Brocade Communications Systems Jumped: What You Need to Know Is this meaningful? Or just another movement? mark for My Articles similar articles
CIO
September 15, 2005
Scott Berinato
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. mark for My Articles similar articles
National Defense
February 2015
Sarah Sicard
Experts: Thwarting Insider Threats Takes A Holistic Approach Insider threats, whether they are foreign spies, disgruntled employees or embezzlers, can't be stopped with software alone, experts at a cyber security summit recently warned. mark for My Articles similar articles
PHONE+ Countering Objections to Cloud Computing Armed with the right information, solution providers can counter common objections to cloud computing sales. mark for My Articles similar articles
Fast Company
Christina Farr
How Effective Is It To Vet The Social Media Activity Of Visa Applicants? Technology company employees are skeptical that government pilot programs to scrutinize visa applicants' social media activity will be effective at rooting out potential terrorists or terrorist sympathizers. mark for My Articles similar articles
InternetNews
September 16, 2004
Roy Mark
Lawmakers Call for Cybersecurity Enhancements As the 108th Congress scrambles in its final days to address homeland security issues, U.S. Reps. Mac Thornberry (R-Texas) and Zoe Lofgren (D-Calif.) are focusing on the state of U.S. cybersecurity. mark for My Articles similar articles
National Defense
January 2012
Stew Magnuson
DHS Science and Technology Directorate Faces Near Annihilation The budget being proposed by the House for the Department of Homeland Security's Science and Technology Directorate is so bare bones it would essentially terminate most of the research and development in the department, the head of the division said. mark for My Articles similar articles
National Defense
July 2006
Harold Kennedy
Biometric Check on U.S. Visitors Drawing Criticism A controversial effort by the Department of Homeland security to create a biometric computer system to keep tabs on all foreigners entering and leaving the country is drawing increasing flak at home and abroad. mark for My Articles similar articles
National Defense
January 2010
Stew Magnuson
DHS Intelligence Nominee to Revamp Beleaguered Office's Hiring Practices Caryn Wagner, nominee to be undersecretary for intelligence and analysis at the Department of Homeland Security, said she will try to improve the low morale, high turnover and slow hiring process at the organization. mark for My Articles similar articles
InternetNews
July 8, 2010
Feds Work for Private-Sector Cybersecurity Deal Public-private partnerships are viewed as the way to go for proper cybersecurity, but experts warn there are still pitfalls. mark for My Articles similar articles