MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
June 30, 2009
Kenneth Corbin
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' mark for My Articles similar articles
InternetNews
April 15, 2010
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. mark for My Articles similar articles
InternetNews
June 8, 2010
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. mark for My Articles similar articles
InternetNews
October 27, 2010
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. mark for My Articles similar articles
InternetNews
July 29, 2010
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks. mark for My Articles similar articles
InternetNews
September 29, 2010
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
National Defense
January 2012
Russell Aldrich
U.S. Should Invest in Truly Unconventional Forms of Warfare Spending enormous resources to increase the already insurmountable conventional military advantage cannot compensate for a disadvantage in non-military warfare capabilities. The face of warfare is changing rapidly, and the United States must adapt. mark for My Articles similar articles
InternetNews
September 7, 2010
Cybersecurity Czar: Privacy Won't Be a Casualty NSA Director Gen. Keith Alexander reaffirmed his view that protecting U.S. government, military and civilian data networks doesn't mean sacrificing citizens' right to privacy. mark for My Articles similar articles
InternetNews
October 9, 2009
Larry Barrett
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Facebook Tipped Off The U.S. Government To Iranian Hackers State Department officials were tipped off by Facebook's new notifications when Iranian hackers compromised their Facebook accounts. mark for My Articles similar articles
Military & Aerospace Electronics
November 2009
John Keller
DOD Information Security Aims to Boost Embedded Computing Cyber Defense Against Computer Hackers The Pentagon's Defense Research & Engineering section is continuing an initiative to plug holes in U.S. military cyber defense by concealing the installation and deployment of information security measures. mark for My Articles similar articles
InternetNews
April 8, 2010
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
InternetNews
August 4, 2009
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. mark for My Articles similar articles
National Defense
March 2012
Stew Magnuson
Can Peace Prevail in Cyberspace? The prospect of an assault on the United States through its networks has been a doomsday scenario for a number of years. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
Fast Company
Victor Kotsev
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. mark for My Articles similar articles
CIO
August 27, 2010
Kim S. Nash
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
February 4, 2010
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. mark for My Articles similar articles
National Defense
November 2014
Sandra I. Erwin
Top 10 Disruptive Technologies for a New Era of Global Instability How the nation's military will keep up in a rapidly changing and dangerous world is the proverbial 64-million-dollar question. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
PC Magazine
August 17, 2005
Peter Suciu
Imperial Glory The French emperor Napoleon used his military and diplomatic skills to subdue half of Europe. In this game, you can try to do better while controlling one of the five major powers of the era. mark for My Articles similar articles
InternetNews
July 28, 2010
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. mark for My Articles similar articles
InternetNews
February 17, 2010
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. mark for My Articles similar articles
Military & Aerospace Electronics
February 2010
John Keller
DARPA moves ahead with National Cyber Range project for advanced cyber security research The U.S. Defense Advanced Research Project Agency in Arlington, Va., is awarding multimillion-dollar contracts to two research organizations to build prototype advanced computing centers to demonstrate and test cyber security, defensive information warfare, and information assurance technologies. mark for My Articles similar articles
National Defense
June 2013
Valerie Insinna
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. mark for My Articles similar articles
InternetNews
September 24, 2010
Obama Admin Mulls Cybersecurity, Senate Bill Stalls Head of U.S. Cyber Command describes White House-led review of current cybersecurity authorities, while efforts in the Senate for comprehensive reform appear to have hit a roadblock. mark for My Articles similar articles
National Defense
August 2004
Roxana Tiron
Israeli Defense Forces Trying to Perfect Urban Combat Tactics, Techniques Israel Defense Forces have been working to perfect their urban warfare tactics, in an effort to eliminate militant cells in the disputed zones of the West Bank and Gaza Strip. mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
InternetNews
March 19, 2009
Kenneth Corbin
Experts See Shortfall in Cybersecurity Research With the nation under constant attack, witnesses call on Commerce Committee to prioritize cybersecurity and promote education in the field. mark for My Articles similar articles
Wired
August 23, 2007
Ralph Peters
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. mark for My Articles similar articles
InternetNews
April 20, 2010
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. mark for My Articles similar articles
InternetNews
March 30, 2010
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. mark for My Articles similar articles
InternetNews
October 14, 2010
Defense, Homeland Security Team in Cyber Push Top military and civilian agencies join forces to pool resources and share personnel in the ongoing struggle to preempt and combat threats against U.S. digital systems. mark for My Articles similar articles
National Defense
January 2016
Allyson Versprille
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. mark for My Articles similar articles
Military & Aerospace Electronics
November 2004
John Keller
An Appeal for New Emphasis on Antisubmarine Warfare With the growing submarine threat from often undetermined adversaries, let's hope a renewed emphasis on antisubmarine warfare (ASW) technology isn't too little, too late. mark for My Articles similar articles
Fast Company
Michael Grothaus
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. mark for My Articles similar articles
National Defense
December 2009
Austin Wright
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
Parameters
Summer 2006
David W. Barno
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. mark for My Articles similar articles
National Defense
February 2016
Jon Harper
Defense Department Moving Slowly on 'Internet of Things' The "Internet of Things" is a key component of the military's modernization strategy. But the Pentagon is behind the curve due to security concerns and other impediments, cyber experts said. mark for My Articles similar articles
National Defense
June 2009
Stew Magnuson
U.S. Plans to Destroy Enemy Computer Networks in Cyber-Attacks Questioned But secrecy may have impeded widespread debate about the nature and implications of cyber-attack. mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
Top 3 Threats and Countermeasures From the Coming Cyberwar: Glossary An explanation of terms like DDoS, root-level penetration, etc. mark for My Articles similar articles
Bank Technology News
January 2009
Rebecca Sausner
Getting the Ear of the New President President-elect Barack Obama is given advice on how to address the daily cyber threats and attacks against the nation's government, military and civilian networks. mark for My Articles similar articles
InternetNews
December 16, 2010
760,000 Exposed in Ohio State Breach A massive data breach at Ohio State University has current and former students and staff scrambling to check their credit reports. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles