Similar Articles |
|
National Defense July 2012 Stew Magnuson |
Stopping the Chinese Hacking Onslaught Cyber Command Commander Army Gen. Keith Alexander last year called the cyber-espionage being conducted against U.S. companies the largest transfer of intellectual property from one nation to another in the history of the world. |
InternetNews October 27, 2010 |
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. |
CIO February 1, 2003 Scott Berinato |
Threats Won't Make the Sky Fall CIOs and other IT executives would be wise to remain focused on what a specific threat means to their organization so that they can address any vulnerabilities that may exist. You don't need to hear the words of a terror threat to sustain such a focus. |
National Defense March 2012 Stew Magnuson |
Can Peace Prevail in Cyberspace? The prospect of an assault on the United States through its networks has been a doomsday scenario for a number of years. |
National Defense December 2015 Lloyd McCoy Jr. |
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. |
BusinessWeek May 13, 2010 Rochelle Garner |
Protecting Cyberspace from Terrorist Attack Richard Clarke says the next national security threat is online, and has advice for companies on how to battle it. |
InternetNews September 29, 2010 |
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. |
CIO April 27, 2015 Stephanie Overby |
Boards are on high alert over security threats Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company's security posture and steer the conversation toward managing business risk. |
InternetNews March 11, 2009 Kenneth Corbin |
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. |
CIO December 14, 2010 |
Why Boards Need CIOs Suzanne Woosley, a veteran corporate board director, makes the case for CIOs as corporate advisors. |
InternetNews January 27, 2010 |
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? |
InternetNews June 30, 2009 Kenneth Corbin |
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' |
InternetNews November 29, 2007 |
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. |
National Defense July 2012 Stew Magnuson |
U.S. Government Attempts to Thwart Chinese Network Intrusions If the might of the Chinese government -- as many believe -- is behind this massive operation, what can the might of the U.S. government do to help companies facing the onslaught? |
InternetNews January 25, 2010 |
China Says Not Behind Cyber Attacks The alleged Chinese cyber attack on Google and other top U.S. Internet firms - and larger issues of China's Internet censorship - continue to fuel the escalating war of words between U.S. and Chinese officials. |
CIO February 19, 2015 |
Security Rises to a CEO-Level Priority The State of the CIO research shows that cybersecurity and enterprise risk are zooming up the charts as high-profile topics on the CIO and CEO agendas, says CIO Publisher Adam Dennison |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews February 24, 2010 |
Lawmakers Dig In On Cybersecurity Bill Supporters of the Cybersecurity Act of 2009 remain steadfast in their support of a bill that would expand President Obama's authority to intervene in the event of a major cyber attack. |
PC World July 9, 2002 Dan Verton |
Experts Expect a Major Terrorist Cyberattack Security and intelligence officials say an attack will happen, and warn that we're not ready to respond. |
CIO October 15, 2003 Ben Worthen |
Security Alerts New warning system taps security contractors for attack data |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. |
InternetNews July 28, 2010 |
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. |
InternetNews March 19, 2009 Kenneth Corbin |
Experts See Shortfall in Cybersecurity Research With the nation under constant attack, witnesses call on Commerce Committee to prioritize cybersecurity and promote education in the field. |
InternetNews June 8, 2010 |
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
The Motley Fool November 14, 2011 Katie Spence |
Cyber Attacks Capable of Crashing the U.S. Economy? With cyber attacks becoming more prevalent, these companies are stepping in to provide solutions. |
Fast Company Neal Ungerleider |
Facebook Tipped Off The U.S. Government To Iranian Hackers State Department officials were tipped off by Facebook's new notifications when Iranian hackers compromised their Facebook accounts. |
National Defense August 2015 Sandra I. Erwin |
Dirty Little Secrets of the Cyber Business The federal government can be the ticket to prosperity. Not so much for the amount of money it spends, but because government networks are ground zero for the cyber wars that are being fought on a daily basis. |
National Defense June 2013 Stew Magnuson |
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. |
InternetNews March 24, 2010 |
U.S. Gov Says Cyber Security Experts in Demand Universities aren't graduating cybersecurity experts fast enough to help the government head off security threats, according to the Department of Homeland Security's Cybersecurity director. |
PC Magazine July 1, 2009 Chloe Albanesius |
Obama's Cyberspace Crackdown The president lays out new online security measures. |
Salon.com August 11, 2000 Fiona Morgan |
Mutually assured dysfunction President Clinton's nuclear missile defense plan will spur a new arms race, a report by top intelligence agencies predicts. |
BusinessWeek April 10, 2008 |
China's Response to BusinessWeek A spokesperson of the Chinese Embassy to the United States responds to questions sent to authorities in Beijing and Washington regarding cyber crimes. |
CIO December 23, 2008 Carrie Mathews |
Corporate Boards: What You Need to Know Before Joining One Four CIOs share tips on how to make sitting on an outside board work for you. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
CIO June 15, 2002 Sarah D. Scalet |
They Want You for a Safer Infrastructure Richard Clarke and Howard Schmidt are coordinating a volunteer effort to try to protect the nation's critical infrastructure. Can they convince corporate America to play along? |
CIO July 16, 2010 Kim S. Nash |
Why the CIO Is a Business Executive First, then a Technologist For Healthways CEO Ben Leedle Jr., the CIO's job isn't just to run IT. It's turning the company's strategy into reality. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
InternetNews January 15, 2010 David Needle |
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. |
CIO January 27, 2015 Adam Hartung |
For CIOs, Joining a Board Requires Role Reversal Even if you aren't currently being pursued to fill a board seat, understanding the different roles should help you be better prepared for making board presentations. |
CIO November 14, 2012 Kim S. Nash |
CIOs Say Corporate Directors Are Clueless About IT Our exclusive research shows that boards of directors still don't understand the role that IT can play in driving business innovation. It's the CIO's job to change that. |
CIO April 25, 2014 Lucian Constantin |
5 Things You Need to Know About Cybersecurity Insurance Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn't do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. |
Insurance & Technology November 5, 2008 Drew Bartkiewicz |
Online Privacy Presents a Growing Liability Not enough companies are prepared for or insured against cyber liability, given the new reality that their business risk is so deeply tied to their mastery of IT and of the Internet itself. |
InternetNews October 21, 2010 |
Cybersecurity Field Needs to 'Professionalize' A panel of experts agreed there's a talent shortfall in cybersecurity, particularly in the government sector, and it's much broader than just technical expertise. |
Popular Mechanics April 2009 Glenn Derene |
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. |
The Motley Fool January 25, 2011 Bryan Hinmon |
Protect Your Portfolio From Cyber Threats Defend your portfolio from The Attack of the Killer e-Tomatoes. |
InternetNews April 24, 2009 Alex Goldman |
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. |
National Defense December 2010 Stew Magnuson |
Pentagon Criticized For Not Doing More to Protect Homeland From Cyberattacks Neither the Pentagon nor the U.S. government has anything resembling a strategy when it comes to protecting the nation's computer networks. |