Similar Articles |
|
National Defense December 2009 Austin Wright |
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
National Defense November 2012 Erwin et al. |
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
National Defense December 2011 Stew Magnuson |
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
InternetNews February 26, 2009 Richard Adhikari |
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. |
National Defense June 2013 Tim Larkins |
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
The Motley Fool July 13, 2009 Rich Smith |
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. |
InternetNews February 20, 2004 Michael Singer |
Security Forces to Show Unified Front Homeland Security officials will join experts from Microsoft and other IT firms in San Francisco next week to address the onslaught of malicious attacks. |
CIO July 20, 2011 Michael Friedenberg |
Pundits Were Right About Mobile Cybersecurity Risks Industry pundits predicted escalating cybersecurity threats, and they were right. |
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... |
National Defense March 2014 Stew Magnuson |
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. |
National Defense September 2011 Eric Beidel |
Homeland Security Market 'Vibrant' Despite Budget Concerns The abundance of small, medium and large firms vying for DHS contracts is creating healthy competition. |
Salon.com April 4, 2001 Caroline Benner |
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... |
InternetNews February 26, 2004 Michael Singer |
The Net Has An 'Insecurity' Complex RSA's second annual assessment of online security leaves little doubt that corporations have a long way to go. |
National Defense August 2011 Zhen Zhang |
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
National Defense October 2013 Yasmin Tadjdeh |
Fears of Devastating Cyber-Attacks on Electric Grid, Critical Infrastructure Grow Department of Homeland Security Secretary Janet Napolitano warned that the United States faces "a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society." |
InternetNews February 9, 2007 Clint Boulton |
RSA Reminds Us to Fight The Good Fight There is no bullet-proof way to outmaneuver people who want your data. But we need to try. |
National Defense August 2011 Eric Beidel |
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
Military & Aerospace Electronics July 2008 John McHale |
Locked down, sensors everywhere Perimeters today are being protected by sensors that detect everything from x-ray scanners at checkpoints to cameras mounted on unmanned aircraft. |
CIO October 30, 2012 Lucian Constantin |
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say |
National Defense August 2011 Beidel & Magnuson |
Government, Military Face Severe Shortage Of Cybersecurity Experts There is an acute shortage of Internet security experts in the government, and no large pool of insourced or outsourced applicants waiting in the wings to join the fight. |
InternetNews March 17, 2009 Kenneth Corbin |
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. |
InternetNews November 10, 2009 |
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. |
InternetNews October 1, 2004 Roy Mark |
U.S. Cybersecurity Chief Resigns Barely a year after taking the job, Amit Yoran resigned Thursday as the country's highest-ranking cybersecurity officer. Yoran was reportedly frustrated over lack of cybersecurity focus in the Bush administration. |
InternetNews April 24, 2009 Alex Goldman |
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. |
InternetNews March 11, 2009 Kenneth Corbin |
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. |
Bank Systems & Technology February 18, 2010 Penny Crosman |
Botnet Affecting 2,500 Organizations Discovered "Kneber Botnet" gathers login credentials to online financial systems, social networking sites and email systems from infested computers. |
Scientific American September 2006 Tom Leighton |
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. |
National Defense December 2010 Grace V. Jean |
Cybersecurity Market a Potential Boon for Simulation Companies Analysts believe that an expected growth in information security spending also could lead to new opportunities for businesses that can help train cyberwarriors. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
National Defense March 2009 Grace V. Jean |
Building a Cybersecurity Lab In an effort to beef up the country's defenses in cyberspace, the Comprehensive National Cybersecurity Initiative, established last year by the Bush administration, seeks to reduce network vulnerabilities, protect against intrusions and anticipate future threats. |
Military & Aerospace Electronics May 2005 |
In Brief BAE Systems protects U.S. Army and Navy helicopters... Northrop Grumman to expand Mississippi UAV facility ... Thales forms alliance partnership with Wind River... Lockheed Martin delivers first Atlas Five Booster to west coast launch site... DC-DC device market continues to grow... etc. |
National Defense September 2010 Sandra I. Erwin |
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. |
InternetNews January 18, 2005 Roy Mark |
Former Cyber Security Chief Rejoins Private Sector Amit Yoran joins financial institution security firm Cyota three months after resigning from his federal government post. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
Military & Aerospace Electronics June 2005 |
Primes Creating Own Mil-Specifications An interview with Northrop Grumman's Taylor W. Lawrence, sector vice president and general manager, C4ISR and Space Sensors division on changing industry and Department of Defense trends. |
The Motley Fool August 31, 2009 Rich Smith |
6 Stocks That Never Surrender In a fight to the finish versus the S&P 500, check in on how six defense stocks are doing. |
The Motley Fool April 22, 2009 Rich Smith |
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. |
CIO February 15, 2002 Stephanie Viscasillas |
GovNetNot? The head of federal cybersecurity has proposed a secure government voice and data network called GovNet. Would it work? |
PC Magazine July 1, 2009 Chloe Albanesius |
Obama's Cyberspace Crackdown The president lays out new online security measures. |
National Defense March 2014 Stew Magnuson |
Power Companies Struggle to Maintain Defenses Against Cyber-Attacks When experts rank U.S. industries' abilities to ward off potentially damaging cyber-attacks, the electric utilities are normally near the bottom. |