Similar Articles |
|
CIO January 1, 2003 Elana Varon |
Think Federally, Secure Locally When the Pacific Northwest Economic Region needed a regional cybersecurity vulnerability assessment, it didn't run to the feds. Instead, the group developed its own exercise, called Blue Cascades, that explored what would happen if critical services like the electric grid or the Internet were lost. |
InternetNews April 10, 2008 Susan Kuchinskas |
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. |
PC World September 11, 2001 Dan Verton |
Terrorist Attacks Shake U.S. Infrastructure Cyberspace may be clogged, but it's apparently not a target -- this time, experts say... |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
Salon.com February 1, 2002 Jeff Stein |
Bin Laden's Olympic dreams Al-Qaida conducted "meticulous" surveillance of Salt Lake City, intelligence official says... |
IEEE Spectrum September 2006 Charles Perrow |
Shrink The Targets Human nature can better withstand a dozen small disasters than a single great one, even if the casualty total is the same. Protecting America's big targets is next to impossible; we should instead downsize them to make them less consequential and easier to protect. |
National Defense April 2014 Stew Magnuson |
Report Ponders What Follows a Cyber Attack on Electric Grid Experts are convinced that a cyber attack on a U.S. electric grid that could cut off power to millions is a near certainty. |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. |
InternetNews January 15, 2010 David Needle |
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. |
CIO August 27, 2010 Kim S. Nash |
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
PC World September 12, 2001 Dan Verton |
Next: Cyberterrorism? Security experts urge companies to guard against digital violence... |
Military & Aerospace Electronics September 2004 |
The 9/11 Report: Details of the central event of our time It's not the sophisticated sensors, signal processing, satellite communications, and automation technology that wins the day in the end; it's the people who use the technology that make the difference. |
National Defense December 2009 Austin Wright |
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets |
National Defense April 2015 Yasmin Tadjdeh |
Big Data Helping to Pinpoint Terrorist Activities, Attacks Using big data for counter terrorism efforts will only become more prevalent as time goes on, said Josh New, a policy analyst at the Information Technology and Innovation Foundation's Center for Data Innovation. |
National Defense November 2013 Yasmin Tadjdeh |
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. |
National Defense October 2010 Stew Magnuson |
Expert Warns of Nexus Between Cybercriminals and Terrorists Terrorists who want to stage a cyberattack against the United States may lean on criminal networks to assist them, a former Defense Department official said. |
InternetNews September 29, 2010 |
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. |
AskMen.com Craig Mazin |
Top 10: Spy Agencies Many countries place great importance on the function of their intelligence/spy agencies. Intelligence failures can lead to terrible consequences, while successes can help countries avert unnecessary tragedies. Read on about the top 10 presently active spy agencies operating in the world today. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
Fast Company Neal Ungerleider |
FBI Probes Fiber-Optic Internet Saboteurs In California The Bay Area's physical Internet infrastructure has been attacked by highly skilled saboteurs on ten other occasions in the past year alone. |
U.S. Banker July 2007 Karen Krebsbach |
After Estonia Cyber Attacks, U.S. Frets Over Potential Cyber War The U.S. Treasury Department's decision to sponsor an industry-wide exercise this fall for the financial-services sector to test its ability to respond to a pandemic crisis is taking on a different, and more sinister tone. |
BusinessWeek June 28, 2004 Paul Magnusson |
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. |
PC World September 12, 2001 Joris Evers |
Spy Technology: Too Little, Too Late? Echelon, other high-tech surveillance tools may not have been effective when needed... |
InternetNews February 17, 2010 |
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. |
National Defense March 2009 Charles Faddis |
CIA Must Return To Its Roots To Become Effective Once Again Almost seven decades after the birth of this civilian intelligence agency, we need to go back to the beginning -- to a lean, flexible, imaginative organization trained and equipped to confront our nation's enemies. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
Parameters Spring 2005 Saxby Chambliss |
We Have Not Correctly Framed the Debate on Intelligence Reform Over the last decade, our intelligence community has failed us. It wasn't able to penetrate the al Qaeda terrorist organization, and we paid a high price for that failure. |
Fast Company Daniel Terdiman |
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. |
National Defense November 2014 Stew Magnuson |
13 Years Later, Still a Ways to Go on Sharing Terrorist Threats With Public The government needs to have a clear communication strategy to combat misinformation and speculation. |
Bank Technology News July 2008 Rebecca Sausner |
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. |
CIO March 1, 2001 Angela Genusa |
Conspiracy of Silence You can't ignore them or avoid them, so you might as well face the security threats to your company's digital crown jewels... |
Mother Jones Jan/Feb 2002 Ted Gup |
Clueless in Langley For two decades, the CIA has been making excuses for why it has failed to tackle terrorism. Can a spy agency rooted in the Cold War adapt to a changed world? |
CIO June 1, 2001 Tracy Mayor |
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... |
Salon.com September 11, 2001 Laura Miller |
A new breed of terrorism A security expert says it's time for the U.S. to declare war on those who are waging war on America... |
National Defense November 2010 Stew Magnuson |
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
Popular Mechanics April 2009 Glenn Derene |
How Hackers Could Take Down a Natural Gas Pipeline Much of America's infrastructure is computer-controlled, and therefore subject to hacking. Here is an in-depth look at the specific vulnerabilities of a natural gas pipeline. |
National Defense June 2006 Harold Kennedy |
Intelligence Sharing: `Still a Battle' According to the National Counterterrorism Center, despite efforts since 9/11 to improve the gathering and analysis of government and military intelligence, getting agencies to pool information is still difficult. |