Similar Articles |
|
InternetNews December 13, 2005 Roy Mark |
Cyber Security Group Flunks Washington Neither the Bush administration nor Congress is providing significant leadership or legislation to secure the United States against cyber attacks, the Cyber Security Industry Alliance charged Tuesday. |
InternetNews December 7, 2004 Roy Mark |
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. |
InternetNews September 14, 2006 Roy Mark |
U.S. Unprepared for Internet Attack Recovery Cyber security experts cite lack of leadership from government and cooperation from private sector. |
InternetNews July 14, 2005 Roy Mark |
Cyber Security Gets Limelight in DHS Reorg Chertoff's organizational changes call for new cyber security position and increased information sharing. |
InternetNews April 8, 2008 David Needle |
Chertoff Calls For Private Sector to Help Secure 'Net At the RSA conference, the homeland security chief lays out an agenda requiring corporate and individual participation. But is it money well spent? |
InternetNews February 2, 2007 Roy Mark |
Congress, White House Dinged on Cyber Security Lawmakers' inability to pass legislation and the administration's lack of leadership earn D's in annual report card from CSIA. |
InternetNews February 17, 2005 Michael Singer |
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. |
Bank Technology News May 1, 2008 Rebecca Sausner |
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. |
InternetNews March 21, 2008 Andy Patrizio |
Feds Tap Silicon Valley Entrepreneur For Security The Bush Administration has picked Silicon Valley entrepreneur Rod Beckstrom to be the head of the new National Cyber Security Center, a division of the Department of Homeland Security. |
InternetNews May 19, 2005 Roy Mark |
House Approves Cybersecurity Promotion Legislation aims to raise profile of protecting federal networks from cyber attacks. |
Reason March 2006 Veronique de Rugy |
Are We Ready for the Next 9/11? The sorry state -- and stunning waste -- of homeland security spending. |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
Popular Mechanics April 21, 2009 Glenn Derene |
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
InternetNews February 25, 2004 Michael Singer |
Security Firms Forge 'Cyber' Alliance A dozen software, hardware, and services companies will lobby for public policy and standards, but without the help of Microsoft. |
National Defense October 2015 Tim Larkins |
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. |
InternetNews January 12, 2005 Roy Mark |
Bush's Cyber Security Force Loses Another One Just four months after the Bush administration's top cyber security official resigned, the infrastructure protection chief has quit. |
InternetNews October 9, 2009 Larry Barrett |
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. |
InternetNews September 29, 2010 |
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. |
Popular Mechanics August 25, 2008 |
Obama, McCain Scout High-Tech Homeland Revamp Here is a breakdown of each candidate's positions on homeland security. |
National Defense September 2005 Harold Kennedy |
Homeland Security Steps Up Emphasis On Preparedness The Department of Homeland Security and the American Red Cross have declared September to be National Preparedness Month. The DHS has undergone major restructuring under Chertoff, but some are critical of how resources are allocated. |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. |
National Defense November 2015 Tomas O'Keefe |
Three Homeland Security Agencies to Watch Knowing where to target sales activities as well as the challenges facing homeland security should help you identify existing opportunities to support DHS to ensure the safety and security of the American public. |
InternetNews April 21, 2005 Roy Mark |
House Panel Pushes Cybersecurity Post New legislation raises profile of the individual responsible for securing the nation against digital attacks. |
InternetNews October 18, 2005 Roy Mark |
Congress Raises Cyber Security Awareness In response to an NCSA report, Congress highlights woeful online protection measures by American consumers. |
InternetNews March 4, 2010 |
DHS Chief: Security Requires Faster Response Department of Homeland Security Secretary Janet Napolitano told security experts and media that while many great ideas have been suggested, less talk and more action is needed to safeguard government and corporate networks. |
InternetNews June 30, 2009 Kenneth Corbin |
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' |
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. |
National Defense June 2004 Harold Kennedy |
Blueprint For Homeland Security The Defense Department is working on a comprehensive homeland defense strategy that will detail the Pentagon's emerging role in protecting the United States from terrorist attack |
InternetNews December 5, 2008 Richard Adhikari |
Cyber Threats Await Next Homeland Security Chief How might Obama's appointment to head the DHS turn things around for the department? Experts weigh in. |
InternetNews January 28, 2009 Richard Adhikari |
Napolitano Keeps DHS on the Hop With cybersecurity, information sharing and risk analysis on the agenda for next week, the new Homeland Security secretary is looking to patch holes, fast. |
InternetNews January 18, 2005 Roy Mark |
Former Cyber Security Chief Rejoins Private Sector Amit Yoran joins financial institution security firm Cyota three months after resigning from his federal government post. |
National Defense March 2014 Yasmin Tadjdeh |
Johnson: DHS Must Build Trust With Private Sector to Counter Cyber-Attacks As cyber-attacks increase, the Department of Homeland Security must begin building trust with the private sector if it hopes to quell more widespread and sophisticated intrusions, said the department's new secretary. |
National Defense October 2007 Breanne Wagner |
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. |
InternetNews October 27, 2010 |
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. |
Information Today October 20, 2015 Barbie E. Keiser |
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. |
Registered Rep. August 16, 2013 Lauren Barack |
Hackers At The Gate "FINRA expects cyber security to remain a regulatory focus for the foreseeable future," Susan Axelrod, FINRA's executive vice president for Regulatory Operations said at the PLI Seminar in October. |
InternetNews April 10, 2008 Susan Kuchinskas |
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. |
InternetNews February 18, 2009 Sean Michael Kerner |
Black Hat: U.S. Needs 'Cyberweapons' for Security An expert asks whether it's time for the U.S. to take aggressive measures to rein in national network security. |
National Defense February 2008 Lawrence P. Farrell Jr. |
U.S. Has Strategy for Homeland Security, But Are We Ready? In October, the White House issued an updated "National Strategy for Homeland Security," which is intended to guide, organize and unify the nation's homeland security efforts. |
National Defense June 2013 Stew Magnuson |
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. |
InternetNews March 11, 2009 Kenneth Corbin |
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. |
National Defense February 2016 Chris Wiedemann |
Finance, Health Care, Agriculture Play Key Roles in Critical Infrastructure Protection Anyone looking to support the mission of critical infrastructure protection outside of DHS should be reaching out to the Departments of Treasury, Health and Human Services, and Agriculture. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
National Defense May 2006 Stew Magnuson |
Lawmakers Introduce Tunnel Legislation The movement of illegal immigrants or narcotics through a tunnel under a U.S. border is a felony, but there are no laws on the books preventing the excavation itself. |
InternetNews September 16, 2004 Roy Mark |
Lawmakers Call for Cybersecurity Enhancements As the 108th Congress scrambles in its final days to address homeland security issues, U.S. Reps. Mac Thornberry (R-Texas) and Zoe Lofgren (D-Calif.) are focusing on the state of U.S. cybersecurity. |
InternetNews February 10, 2009 Kenneth Corbin |
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. |
National Defense November 2006 Stew Magnuson |
Fear of Terror Weapons Drives Tech Funding With the nation in the throes of the so-called "long war," it is no surprise that the bulk of the Department of Homeland Security's research dollars is going toward technologies designed to prevent terrorist attacks. |
National Defense August 2011 Eric Beidel |
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. |