Similar Articles |
|
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
InternetNews April 15, 2010 |
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. |
InternetNews July 29, 2010 |
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks. |
InternetNews October 8, 2009 |
FOCUS 09: McAfee Lays Out Security Battle Plan McAfee CEO Dave DeWalt detailed the vendor's strategy for battling malware, while Colin Powell had a few things to say about hackers. |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. |
InternetNews August 4, 2009 |
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. |
The Motley Fool July 13, 2009 Rich Smith |
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. |
InternetNews October 27, 2010 |
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. |
InternetNews June 8, 2010 |
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. |
InternetNews June 6, 2005 Roy Mark |
Former Cyber Chief Raises 'Perfect Storm' Three former Bush administration top cyber security officials don't think the White House or the top levels of the private sector are putting enough priority on securing the nation's networks. |
National Defense October 2007 Breanne Wagner |
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. |
InternetNews March 23, 2010 |
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
National Defense January 2016 Allyson Versprille |
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
National Defense January 2012 Russell Aldrich |
U.S. Should Invest in Truly Unconventional Forms of Warfare Spending enormous resources to increase the already insurmountable conventional military advantage cannot compensate for a disadvantage in non-military warfare capabilities. The face of warfare is changing rapidly, and the United States must adapt. |
InternetNews September 8, 2006 Roy Mark |
Five Years Later, Are We More Secure? We may be more secure in some ways since 9/11, but network security isn't one of them. |
InternetNews January 27, 2010 |
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? |
InternetNews June 30, 2009 Kenneth Corbin |
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. |
InternetNews February 10, 2006 Roy Mark |
DoJ Wants Cyber Crime Stats The Department of Justice is launching its first national survey to measure the prevalence and impact of cyber crime on U.S. businesses. |
InternetNews November 29, 2007 |
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. |
InternetNews October 8, 2009 |
FBI Holds Its Own Phish Phry Fed crackdown nets the largest number of defendants ever charged in a cyber crime scam. |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
InternetNews March 28, 2005 Tim Gray |
Alliance Formed to Finger Hackers The Fingerprint Sharing Alliance, an initiative comprised of global communications service providers, attempts to decrease the number of Internet attacks. |
InternetNews November 11, 2005 Roy Mark |
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. |
National Defense March 2012 Stew Magnuson |
Can Peace Prevail in Cyberspace? The prospect of an assault on the United States through its networks has been a doomsday scenario for a number of years. |
Bank Technology News May 1, 2008 Rebecca Sausner |
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. |
InternetNews December 7, 2004 Roy Mark |
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. |
InternetNews August 2, 2006 Sean Michael Kerner |
The FBI Fight Against Organized Cyber Crime The bureau is making it's fight against organized cyber crime personal. |
InternetNews April 23, 2010 |
SMBs Often a Weak Link in Cyber Security Lax data security and a lack of resources could be exposing small and midsized businesses - and their customers - to risk. |
National Defense December 2009 Austin Wright |
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets |
InternetNews July 28, 2010 |
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. |
Insurance & Technology November 5, 2008 Prasad Balakrishnan |
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
Military & Aerospace Electronics February 2010 John Keller |
DARPA moves ahead with National Cyber Range project for advanced cyber security research The U.S. Defense Advanced Research Project Agency in Arlington, Va., is awarding multimillion-dollar contracts to two research organizations to build prototype advanced computing centers to demonstrate and test cyber security, defensive information warfare, and information assurance technologies. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews September 14, 2006 Roy Mark |
U.S. Unprepared for Internet Attack Recovery Cyber security experts cite lack of leadership from government and cooperation from private sector. |
InternetNews October 28, 2009 |
McAfee: SMBs Can't Afford to Ignore Cyber Threats Security software vendor says small- and midsized companies are becoming a popular target for hackers and online thieves. |
InternetNews March 19, 2009 Kenneth Corbin |
Experts See Shortfall in Cybersecurity Research With the nation under constant attack, witnesses call on Commerce Committee to prioritize cybersecurity and promote education in the field. |
InternetNews April 10, 2008 Susan Kuchinskas |
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
InternetNews February 17, 2005 Michael Singer |
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. |