MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
January 1, 2003
Elana Varon
Think Federally, Secure Locally When the Pacific Northwest Economic Region needed a regional cybersecurity vulnerability assessment, it didn't run to the feds. Instead, the group developed its own exercise, called Blue Cascades, that explored what would happen if critical services like the electric grid or the Internet were lost. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. mark for My Articles similar articles
PC World
September 11, 2001
Dan Verton
Terrorist Attacks Shake U.S. Infrastructure Cyberspace may be clogged, but it's apparently not a target -- this time, experts say... mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
Salon.com
February 1, 2002
Jeff Stein
Bin Laden's Olympic dreams Al-Qaida conducted "meticulous" surveillance of Salt Lake City, intelligence official says... mark for My Articles similar articles
IEEE Spectrum
September 2006
Charles Perrow
Shrink The Targets Human nature can better withstand a dozen small disasters than a single great one, even if the casualty total is the same. Protecting America's big targets is next to impossible; we should instead downsize them to make them less consequential and easier to protect. mark for My Articles similar articles
National Defense
April 2014
Stew Magnuson
Report Ponders What Follows a Cyber Attack on Electric Grid Experts are convinced that a cyber attack on a U.S. electric grid that could cut off power to millions is a near certainty. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
InternetNews
January 15, 2010
David Needle
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. mark for My Articles similar articles
CIO
August 27, 2010
Kim S. Nash
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. mark for My Articles similar articles
National Defense
January 2005
Joe Pappalardo
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
PC World
September 12, 2001
Dan Verton
Next: Cyberterrorism? Security experts urge companies to guard against digital violence... mark for My Articles similar articles
Military & Aerospace Electronics
September 2004
The 9/11 Report: Details of the central event of our time It's not the sophisticated sensors, signal processing, satellite communications, and automation technology that wins the day in the end; it's the people who use the technology that make the difference. mark for My Articles similar articles
National Defense
December 2009
Austin Wright
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets mark for My Articles similar articles
National Defense
April 2015
Yasmin Tadjdeh
Big Data Helping to Pinpoint Terrorist Activities, Attacks Using big data for counter terrorism efforts will only become more prevalent as time goes on, said Josh New, a policy analyst at the Information Technology and Innovation Foundation's Center for Data Innovation. mark for My Articles similar articles
National Defense
November 2013
Yasmin Tadjdeh
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. mark for My Articles similar articles
National Defense
October 2010
Stew Magnuson
Expert Warns of Nexus Between Cybercriminals and Terrorists Terrorists who want to stage a cyberattack against the United States may lean on criminal networks to assist them, a former Defense Department official said. mark for My Articles similar articles
InternetNews
September 29, 2010
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. mark for My Articles similar articles
AskMen.com
Craig Mazin
Top 10: Spy Agencies Many countries place great importance on the function of their intelligence/spy agencies. Intelligence failures can lead to terrible consequences, while successes can help countries avert unnecessary tragedies. Read on about the top 10 presently active spy agencies operating in the world today. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
Fast Company
Neal Ungerleider
FBI Probes Fiber-Optic Internet Saboteurs In California The Bay Area's physical Internet infrastructure has been attacked by highly skilled saboteurs on ten other occasions in the past year alone. mark for My Articles similar articles
U.S. Banker
July 2007
Karen Krebsbach
After Estonia Cyber Attacks, U.S. Frets Over Potential Cyber War The U.S. Treasury Department's decision to sponsor an industry-wide exercise this fall for the financial-services sector to test its ability to respond to a pandemic crisis is taking on a different, and more sinister tone. mark for My Articles similar articles
BusinessWeek
June 28, 2004
Paul Magnusson
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. mark for My Articles similar articles
PC World
September 12, 2001
Joris Evers
Spy Technology: Too Little, Too Late? Echelon, other high-tech surveillance tools may not have been effective when needed... mark for My Articles similar articles
InternetNews
February 17, 2010
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. mark for My Articles similar articles
National Defense
March 2009
Charles Faddis
CIA Must Return To Its Roots To Become Effective Once Again Almost seven decades after the birth of this civilian intelligence agency, we need to go back to the beginning -- to a lean, flexible, imaginative organization trained and equipped to confront our nation's enemies. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
Parameters
Spring 2005
Saxby Chambliss
We Have Not Correctly Framed the Debate on Intelligence Reform Over the last decade, our intelligence community has failed us. It wasn't able to penetrate the al Qaeda terrorist organization, and we paid a high price for that failure. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
National Defense
November 2014
Stew Magnuson
13 Years Later, Still a Ways to Go on Sharing Terrorist Threats With Public The government needs to have a clear communication strategy to combat misinformation and speculation. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
CIO
March 1, 2001
Angela Genusa
Conspiracy of Silence You can't ignore them or avoid them, so you might as well face the security threats to your company's digital crown jewels... mark for My Articles similar articles
Mother Jones
Jan/Feb 2002
Ted Gup
Clueless in Langley For two decades, the CIA has been making excuses for why it has failed to tackle terrorism. Can a spy agency rooted in the Cold War adapt to a changed world? mark for My Articles similar articles
CIO
June 1, 2001
Tracy Mayor
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... mark for My Articles similar articles
Salon.com
September 11, 2001
Laura Miller
A new breed of terrorism A security expert says it's time for the U.S. to declare war on those who are waging war on America... mark for My Articles similar articles
National Defense
November 2010
Stew Magnuson
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
Popular Mechanics
April 2009
Glenn Derene
How Hackers Could Take Down a Natural Gas Pipeline Much of America's infrastructure is computer-controlled, and therefore subject to hacking. Here is an in-depth look at the specific vulnerabilities of a natural gas pipeline. mark for My Articles similar articles
National Defense
June 2006
Harold Kennedy
Intelligence Sharing: `Still a Battle' According to the National Counterterrorism Center, despite efforts since 9/11 to improve the gathering and analysis of government and military intelligence, getting agencies to pool information is still difficult. mark for My Articles similar articles