Similar Articles |
|
National Defense January 2012 Eric Beidel |
Military Academies Look to Fill Nation's Cybersecurity Gaps Like West Point, the other academies recognize the sea change and are putting increased focus on their network security curriculum, both for these specialists and for the rest of the students who pass through their doors. |
National Defense November 2011 Eric Beidel |
Coast Guard Cyberdefense Office: Small but Mighty Like the Army, Navy, Air Force and Marine Corps, the Coast Guard suffers thousands of attacks on its networks each month. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
Popular Mechanics April 21, 2009 Glenn Derene |
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. |
National Defense June 2013 Valerie Insinna |
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. |
National Defense August 2011 Beidel & Magnuson |
Government, Military Face Severe Shortage Of Cybersecurity Experts There is an acute shortage of Internet security experts in the government, and no large pool of insourced or outsourced applicants waiting in the wings to join the fight. |
HBS Working Knowledge September 15, 2003 David A. Garvin |
HBS Cases: Developing the Courage to Act Professor David A. Garvin offers a rare inside glimpse at how the case method is used by both faculty and students in classrooms at Harvard Business School. |
InternetNews September 24, 2010 |
Obama Admin Mulls Cybersecurity, Senate Bill Stalls Head of U.S. Cyber Command describes White House-led review of current cybersecurity authorities, while efforts in the Senate for comprehensive reform appear to have hit a roadblock. |
CIO October 1, 2005 Ben Worthen |
The Sky Really Is Falling Ed Lazowska, cochairman of the President's Information Technology Advisory Committee, says that there is a looming security crisis, and the government, vendors and CIOs aren't doing enough to stop it. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
Popular Mechanics April 2009 Glenn Derene |
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. |
National Defense December 2013 Maggie Heyn Richardson |
New Hub For Training Cyberworkers Emerges in Northern Louisiana Louisiana Tech University is a designated Center of Academic Excellence in Information Assurance by the Department of Homeland Security and the National Security Agency and major defense contractors are located at the The National Cyber Research Park in Bossier City. |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. |
Mother Jones February 2001 Eyal Press & Jennifer Washburn |
Digital Diplomas Welcome to the brave new world of higher education, where profesors are 'content experts,' classes are 'courseware,' and students are customers. But just what is a dot-com degree worth? |
National Defense December 2009 Austin Wright |
Army Leaders Prepare for War, Peace and Everything In Between The military is transitioning from a group of one-track warriors to a force of multitaskers who can advise, assist and attack. |
National Defense July 2010 Stew Magnuson |
Competition Keen for Next Generation of Cyberwarriors The Air Force last year established its first command devoted solely to protecting and attacking networks. But in a time when cybersecurity experts are in high demand, the question has arisen: Where is the talent coming from? |
T.H.E. Journal August 2000 Richard Peregoy |
Developing Strategies for Networked Education The raging growth of distance learning extends the reach of traditional educational approaches. Assessing strengths, weaknesses, opportunities and threats, one institution has developed a progressively expanding, networked distance education program.... |
InternetNews October 14, 2010 |
Defense, Homeland Security Team in Cyber Push Top military and civilian agencies join forces to pool resources and share personnel in the ongoing struggle to preempt and combat threats against U.S. digital systems. |
National Defense December 2010 Grace V. Jean |
Air Force Graduates First Batch of Cyberwarriors Thousands of Air Force communications personnel are now transitioning into the newly designated cyber career field. |
CRM May 2014 Maria Minsker |
The Evolution of the MBA What business schools are doing to better prepare your future employees. |
National Defense September 2010 Sandra I. Erwin |
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. |
Fast Company Victor Kotsev |
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. |
T.H.E. Journal October 2002 Brawner et al. |
Partnerships Increase Access to Engineering Education: North Carolina's Two+Two Experience There are a number of benefits to this distance education model as it currently exists. Foremost, people from around the state are provided with increased access to engineering education. |
National Defense November 2012 Erwin et al. |
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. |
T.H.E. Journal May 2001 Gregory Farrington & Stephen Bronack |
Sink or Swim? Higher education online: how do we know what works --- and what doesn't? |
InternetNews March 17, 2009 Kenneth Corbin |
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. |
Popular Mechanics September 2008 Glenn Derene |
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
InternetNews October 9, 2009 Larry Barrett |
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. |
InternetNews November 10, 2009 |
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. |
The Motley Fool April 22, 2009 Rich Smith |
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. |
T.H.E. Journal December 2004 Kim Jones |
2005: The Year of the Digital Campus Today, learning is no longer bound to a fixed location such as a classroom. Thanks to some innovative technology trends, the educational landscape is transforming into a "digital campus." |
InternetNews May 4, 2009 Kenneth Corbin |
Federal Cybersecurity a Tough Balance to Strike House panel seeks answers, advice from cybersecurity experts as government mulls major reorganization. |
HBS Working Knowledge February 12, 2007 Julia Hanna |
"UpTick" Brings Wall Street Pressure to Students UpTick is a market simulation program that has students sweating and strategizing as they recreate classic market scenarios. |
National Defense April 2014 Stew Magnuson |
Report Ponders What Follows a Cyber Attack on Electric Grid Experts are convinced that a cyber attack on a U.S. electric grid that could cut off power to millions is a near certainty. |
Financial Advisor June 2012 Jerilyn Klein Bier |
Class Act More business schools are offering corporate responsibility and SRI components. |
T.H.E. Journal December 2000 L. E. Levine, V. Mazmanian, P. Miller, & R. Pinkham |
Calculus, Technology and Coordination Approximately 300 incoming first-year students at Stevens take calculus. This is a natural course for the use of laptops and technology as teaching and learning tools... |
National Defense August 2011 Stew Magnuson |
Do Cyberwarriors Belong at Special Operations Command? Josh Hartman, a former congressional staffer and Defense Department executive, knows a good place for the military to house its cadre of cyberwarriors: In Tampa, Fla., at MacDill Air Force Base, home of Special Operations Command. |
Mother Jones Jan/Feb 2002 David Goodman |
Recruiting the Class of 2005 Military programs have expanded into thousands of public high schools, signing up nearly half a million students. Is Junior ROTC building character -- or lining up soldiers? |
HHMI Bulletin May 2012 Erin Peterson |
Making Bigger Better University of Texas at Austin Freshman Research Initiative student Holli Duhon describes her research. |
InternetNews April 24, 2009 Alex Goldman |
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. |
National Defense August 2014 Stew Magnuson |
Cyber Labor Shortage Not What it Seems, Experts Say Only a handful of universities offering cyber security degrees are producing graduates who have "hard skills." |
T.H.E. Journal December 2000 Robyn Quick & Thom Lieb |
The Heartfield Project Using Computer Technology to Facilitate Interdisciplinary Collaborations in Higher Education... |
IEEE Spectrum May 2012 Tekla S. Perry |
John L. Hennessy: Risk Taker Stanford University's president predicts the death of the lecture hall as university education moves online |
National Defense June 2013 Tim Larkins |
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. |
National Defense October 2005 Joe Pappalardo |
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. |
National Defense October 2015 Tim Larkins |
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. |
T.H.E. Journal September 2000 Nancy M. Short |
Asynchronous Distance Education A Five Step Approach to Eliminate Online Problems Before They Happen |
InternetNews April 15, 2010 |
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. |