MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
December 2009
Austin Wright
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
National Defense
December 2013
Yasmin Tadjdeh
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. mark for My Articles similar articles
National Defense
November 2012
Erwin et al.
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
National Defense
December 2011
Stew Magnuson
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
National Defense
January 2005
Joe Pappalardo
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. mark for My Articles similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
InternetNews
February 20, 2004
Michael Singer
Security Forces to Show Unified Front Homeland Security officials will join experts from Microsoft and other IT firms in San Francisco next week to address the onslaught of malicious attacks. mark for My Articles similar articles
CIO
July 20, 2011
Michael Friedenberg
Pundits Were Right About Mobile Cybersecurity Risks Industry pundits predicted escalating cybersecurity threats, and they were right. mark for My Articles similar articles
OCC Bulletin
May 15, 2000
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... mark for My Articles similar articles
National Defense
March 2014
Stew Magnuson
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. mark for My Articles similar articles
National Defense
September 2011
Eric Beidel
Homeland Security Market 'Vibrant' Despite Budget Concerns The abundance of small, medium and large firms vying for DHS contracts is creating healthy competition. mark for My Articles similar articles
Salon.com
April 4, 2001
Caroline Benner
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... mark for My Articles similar articles
InternetNews
February 26, 2004
Michael Singer
The Net Has An 'Insecurity' Complex RSA's second annual assessment of online security leaves little doubt that corporations have a long way to go. mark for My Articles similar articles
National Defense
August 2011
Zhen Zhang
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
National Defense
October 2013
Yasmin Tadjdeh
Fears of Devastating Cyber-Attacks on Electric Grid, Critical Infrastructure Grow Department of Homeland Security Secretary Janet Napolitano warned that the United States faces "a major cyber-event that will have a serious effect on our lives, our economy and the everyday functioning of our society." mark for My Articles similar articles
InternetNews
February 9, 2007
Clint Boulton
RSA Reminds Us to Fight The Good Fight There is no bullet-proof way to outmaneuver people who want your data. But we need to try. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
Military & Aerospace Electronics
July 2008
John McHale
Locked down, sensors everywhere Perimeters today are being protected by sensors that detect everything from x-ray scanners at checkpoints to cameras mounted on unmanned aircraft. mark for My Articles similar articles
CIO
October 30, 2012
Lucian Constantin
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say mark for My Articles similar articles
National Defense
August 2011
Beidel & Magnuson
Government, Military Face Severe Shortage Of Cybersecurity Experts There is an acute shortage of Internet security experts in the government, and no large pool of insourced or outsourced applicants waiting in the wings to join the fight. mark for My Articles similar articles
InternetNews
March 17, 2009
Kenneth Corbin
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. mark for My Articles similar articles
InternetNews
November 10, 2009
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. mark for My Articles similar articles
InternetNews
October 1, 2004
Roy Mark
U.S. Cybersecurity Chief Resigns Barely a year after taking the job, Amit Yoran resigned Thursday as the country's highest-ranking cybersecurity officer. Yoran was reportedly frustrated over lack of cybersecurity focus in the Bush administration. mark for My Articles similar articles
InternetNews
April 24, 2009
Alex Goldman
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. mark for My Articles similar articles
InternetNews
March 11, 2009
Kenneth Corbin
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. mark for My Articles similar articles
Bank Systems & Technology
February 18, 2010
Penny Crosman
Botnet Affecting 2,500 Organizations Discovered "Kneber Botnet" gathers login credentials to online financial systems, social networking sites and email systems from infested computers. mark for My Articles similar articles
Scientific American
September 2006
Tom Leighton
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. mark for My Articles similar articles
National Defense
December 2010
Grace V. Jean
Cybersecurity Market a Potential Boon for Simulation Companies Analysts believe that an expected growth in information security spending also could lead to new opportunities for businesses that can help train cyberwarriors. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
National Defense
March 2009
Grace V. Jean
Building a Cybersecurity Lab In an effort to beef up the country's defenses in cyberspace, the Comprehensive National Cybersecurity Initiative, established last year by the Bush administration, seeks to reduce network vulnerabilities, protect against intrusions and anticipate future threats. mark for My Articles similar articles
Military & Aerospace Electronics
May 2005
In Brief BAE Systems protects U.S. Army and Navy helicopters... Northrop Grumman to expand Mississippi UAV facility ... Thales forms alliance partnership with Wind River... Lockheed Martin delivers first Atlas Five Booster to west coast launch site... DC-DC device market continues to grow... etc. mark for My Articles similar articles
National Defense
September 2010
Sandra I. Erwin
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. mark for My Articles similar articles
National Defense
June 2011
Stew Magnuson
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. mark for My Articles similar articles
InternetNews
January 18, 2005
Roy Mark
Former Cyber Security Chief Rejoins Private Sector Amit Yoran joins financial institution security firm Cyota three months after resigning from his federal government post. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles
Military & Aerospace Electronics
June 2005
Primes Creating Own Mil-Specifications An interview with Northrop Grumman's Taylor W. Lawrence, sector vice president and general manager, C4ISR and Space Sensors division on changing industry and Department of Defense trends. mark for My Articles similar articles
The Motley Fool
August 31, 2009
Rich Smith
6 Stocks That Never Surrender In a fight to the finish versus the S&P 500, check in on how six defense stocks are doing. mark for My Articles similar articles
The Motley Fool
April 22, 2009
Rich Smith
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. mark for My Articles similar articles
CIO
February 15, 2002
Stephanie Viscasillas
GovNetNot? The head of federal cybersecurity has proposed a secure government voice and data network called GovNet. Would it work? mark for My Articles similar articles
PC Magazine
July 1, 2009
Chloe Albanesius
Obama's Cyberspace Crackdown The president lays out new online security measures. mark for My Articles similar articles
National Defense
March 2014
Stew Magnuson
Power Companies Struggle to Maintain Defenses Against Cyber-Attacks When experts rank U.S. industries' abilities to ward off potentially damaging cyber-attacks, the electric utilities are normally near the bottom. mark for My Articles similar articles