MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
March 2013
Valerie Insinna
Defense Department to Wring Savings From Its Info-Tech Buys Although the Defense Department continues to pour funding into information technology initiatives, contractors may find the pool of money shrinking over the next five years. mark for My Articles similar articles
National Defense
February 2015
Meloni & McCoy Jr.
Defense IT Investment to Focus on Big Data, Cloud As the Defense Department cuts spending on information technology, it is focusing on a "technological offset strategy" to counterbalance a shrinking fighting force. mark for My Articles similar articles
National Defense
June 2015
Lloyd McCoy
Navy IT Priorities Stress Security, Efficiency With the Navy projecting flat spending over the next few years, it will be looking to information technology to help meet its goals. mark for My Articles similar articles
Parameters
Autumn 2007
Gregory L. Cantwell
Nation-Building: A Joint Enterprise When America's Army is at war, is the nation also at war? mark for My Articles similar articles
National Defense
November 2014
Stephanie Meloni
Army Seeks to Simplify, Create More Interoperability for Information Systems Success in this simplification strategy may be a bellwether for cost savings across the Defense Department. mark for My Articles similar articles
National Defense
April 2006
Claude V. Christianson
Joint Logistics: A Personal Perspective We have an opportunity to significantly advance our systems, processes and organizations to improve support for the joint force commander -- and we must seize it, says this Army Lt. Gen. and director for logistics on the Joint Staff. mark for My Articles similar articles
National Defense
May 2005
Lawrence P. Farrell
Successful Net-Centric Operations Require Joint Testing The wars U.S. forces are fighting today---and can be expected to fight in the foreseeable future---undoubtedly are shaping the military services' requirements for new and improved technology. mark for My Articles similar articles
Parameters
Summer 2004
Brownlee & Schoomaker
Serving a Nation at War: A Campaign Quality Army with Joint and Expeditionary Capabilities The United States is driving a rapid evolution in the methods and techniques of war. mark for My Articles similar articles
National Defense
March 2013
Stew Magnuson
Chemical-Biological Defense Office To Kick Off Dozens of New Programs The previous decade has seen little in terms of advancement of nuclear-radiological detection devices, and there will be a new push to update them. mark for My Articles similar articles
National Defense
December 2015
Lloyd McCoy Jr.
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. mark for My Articles similar articles
InternetNews
December 8, 2008
Richard Adhikari
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. mark for My Articles similar articles
Parameters
Summer 2005
Cebrowski & Raymond
Operationally Responsive Space: A New Defense Business Model As the major defense power in the world, the United States military must dare to compete with itself to ensure sustained advantage. We must set our own standards. Space has long been an arena of American dominance. That must continue. mark for My Articles similar articles
National Defense
November 2004
Roxana Tiron
Pentagon Seeks Joint Doctrine, Training for Personnel Recovery Despite accounting for each and every missing soldier in the Iraq war the combat search and rescue community is stretched thin and grappling with gaps ranging from policy to training. mark for My Articles similar articles
National Defense
August 2011
Zhen Zhang
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. mark for My Articles similar articles
Parameters
November 2004
Augustus W. Fountain Iii
Transforming Defense Basic Research Strategy The US armed forces currently enjoy an unprecedented level of technological superiority across the full spectrum of military threats. mark for My Articles similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles similar articles
National Defense
March 2008
Stew Magnuson
Goal of a `Network-Centric' Military Seems Distant Unblocking communications and data sharing barriers is necessary if the military will achieve its longtime goal of becoming a network-centric force. mark for My Articles similar articles
National Defense
June 2015
Haber & Jeffress
Pentagon Must Tread Carefully On 'Joint' Weapon Acquisitions With downward budgetary pressures on U.S. defense spending, it will be worth watching how the Pentagon moves forward with joint-service acquisitions. mark for My Articles similar articles
National Defense
June 2013
Valerie Insinna
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Napolitano Keeps DHS on the Hop With cybersecurity, information sharing and risk analysis on the agenda for next week, the new Homeland Security secretary is looking to patch holes, fast. mark for My Articles similar articles
Parameters
Winter 2005/2006
Mitchell J. Thompson
Breaking the Proconsulate: A New Design for National Power There have been few truly transformational changes to the institutions of national security, only slight modifications to the existing ones. mark for My Articles similar articles
National Defense
April 2004
Steve Callicutt & Larry McKee
Air Force Takes Lead in Net-Centric Operations The U.S. military services have made significant progress in networking their weapons systems and sharing battlefield data during the last 10-15 years. But more work is needed to ensure seamless information flow and to improve joint command-and-control. mark for My Articles similar articles
InternetNews
October 14, 2010
Defense, Homeland Security Team in Cyber Push Top military and civilian agencies join forces to pool resources and share personnel in the ongoing struggle to preempt and combat threats against U.S. digital systems. mark for My Articles similar articles
National Defense
December 2004
Michael Peck
Quick Mission Rehearsals Goal of Joint Training Slashing the rehearsal time needed for joint training missions from months to days is one of the goals of the joint national training capability (JNTC), a concept designed to move joint warfare from rhetoric to reality. mark for My Articles similar articles
National Defense
May 2004
Lawrence P. Farrell Jr.
`Information Fusion' Key to Winning Wars What made a huge difference in the Iraq and Afghanistan wars, said Roche, was the fusion of information. mark for My Articles similar articles
Information Today
November 7, 2013
George H. Pike
U.S. Government Releases Proposed Cybersecurity Framework The Obama administration is taking public comments on a proposed framework for improving cybersecurity in communication and other critical industries. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
PC World
September 17, 2002
National Cybersecurity Plan to Debut Users, vendors have a role in helping secure cyberspace, in Bush strategy still in the works. mark for My Articles similar articles
CIO
October 1, 2005
Ben Worthen
The Sky Really Is Falling Ed Lazowska, cochairman of the President's Information Technology Advisory Committee, says that there is a looming security crisis, and the government, vendors and CIOs aren't doing enough to stop it. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Obama Proposes Millions for Cybersecurity Security experts are praising the new administration's increased spending on national network security efforts. mark for My Articles similar articles
National Defense
August 2012
Sandra I. Erwin
Cybersecurity Legislation: Solution or Distraction? After three years of debate and intense horse-trading, four major pieces of cybersecurity legislation have collided on Capitol Hill. Each claims to provide definitive policy and legal answers on how the United States should protect itself from crippling cyber-attacks. mark for My Articles similar articles
National Defense
August 2013
Lou Kratz
As Spending Comes Down, Strategic Choices Needed After more than a decade of conflict, the United States has begun to draw down defense spending, with sequestration cuts expected to continue over the coming years. mark for My Articles similar articles
CIO
January 1, 2003
Elana Varon
Think Federally, Secure Locally When the Pacific Northwest Economic Region needed a regional cybersecurity vulnerability assessment, it didn't run to the feds. Instead, the group developed its own exercise, called Blue Cascades, that explored what would happen if critical services like the electric grid or the Internet were lost. mark for My Articles similar articles
InternetNews
March 17, 2009
Kenneth Corbin
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. mark for My Articles similar articles
InternetNews
November 10, 2009
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. mark for My Articles similar articles
National Defense
December 2013
Yasmin Tadjdeh
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. mark for My Articles similar articles
National Defense
September 2013
Jeffrey Trumbore
Combat Experience of Bomb-Disposal Teams Should Be Codified The last 12 years of conflict have firmly established the roles of explosive ordnance disposal teams in supporting joint operations. mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
National Defense
March 2009
Grace V. Jean
Building a Cybersecurity Lab In an effort to beef up the country's defenses in cyberspace, the Comprehensive National Cybersecurity Initiative, established last year by the Bush administration, seeks to reduce network vulnerabilities, protect against intrusions and anticipate future threats. mark for My Articles similar articles
InternetNews
May 1, 2009
Alex Goldman
Defense Industry Data Needs Its Own Defenses The U.S. military only recently began to coordinate cybersecurity with private companies. mark for My Articles similar articles
National Defense
November 2012
Erwin et al.
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. mark for My Articles similar articles
National Defense
September 2010
Sandra I. Erwin
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. mark for My Articles similar articles
New Architect
January 2003
Bret A. Fausett
Ask Not What the Internet Can Do for You Your role in national security: the government's "National Strategy to Secure Cyberspace" starts in the home with the individual user. mark for My Articles similar articles
InternetNews
May 29, 2009
Kenneth Corbin
Obama Moves Cybersecurity into the White House The president calls for a White House cybersecurity coordinator -- and reports that his own campaign was breached. mark for My Articles similar articles
InternetNews
July 8, 2010
Feds Work for Private-Sector Cybersecurity Deal Public-private partnerships are viewed as the way to go for proper cybersecurity, but experts warn there are still pitfalls. mark for My Articles similar articles
National Defense
August 2013
Macgregor & Burke
Defense Industry Can Profit Despite Downturn For the first time in decades, the Defense Department must aggressively pursue value, not simply effort. The current practice of rewarding senior military leaders and defense appointees for effort, time, staff size and budget rather than bold, effective achievement must be arrested. mark for My Articles similar articles
CRM
January 2010
Donna Fluss
Contact Center Innovation: What to Expect in 2010 Organizations must change their mission and culture to benefit from new technologies. mark for My Articles similar articles
Information Today
October 20, 2015
Barbie E. Keiser
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. mark for My Articles similar articles
CIO
June 26, 2009
Kim S. Nash
Obama's Cybersecurity Push: What It Means for CIOs President Obama aims to fix U.S. cybersecurity, but can the feds hit a moving target? Not without private sector support and practical solutions. mark for My Articles similar articles