MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
July 2012
Stew Magnuson
Stopping the Chinese Hacking Onslaught Cyber Command Commander Army Gen. Keith Alexander last year called the cyber-espionage being conducted against U.S. companies the largest transfer of intellectual property from one nation to another in the history of the world. mark for My Articles similar articles
National Defense
December 2015
Lloyd McCoy Jr.
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. mark for My Articles similar articles
National Defense
April 2013
Stew Magnuson
Cybersecurity Executive Order Can Only Do So Much; New Legislation Needed, Official Says The order called for the expansion of the Defense Industrial Base Information Sharing Program, in which companies alert the Defense Department to attacks on their systems, and it, in turn, sends out reports on the new threats to all participants. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
National Defense
June 2013
Stew Magnuson
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. mark for My Articles similar articles
InternetNews
May 1, 2009
Alex Goldman
Defense Industry Data Needs Its Own Defenses The U.S. military only recently began to coordinate cybersecurity with private companies. mark for My Articles similar articles
National Defense
December 2011
Stew Magnuson
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
National Defense
January 2014
Stew Magnuson
New Cyber Framework Aimed at Small, Mid-Tier Defense Companies A National Institute of Standards and Technology framework intended to help companies and organizations bolster their cybersecurity may have a big impact for small- and mid-tier defense contractors, experts said. mark for My Articles similar articles
InternetNews
August 3, 2010
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. mark for My Articles similar articles
National Defense
August 2012
Sandra I. Erwin
Cybersecurity Legislation: Solution or Distraction? After three years of debate and intense horse-trading, four major pieces of cybersecurity legislation have collided on Capitol Hill. Each claims to provide definitive policy and legal answers on how the United States should protect itself from crippling cyber-attacks. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
National Defense
January 2016
Allyson Versprille
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. mark for My Articles similar articles
InternetNews
December 7, 2004
Roy Mark
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
InternetNews
March 23, 2010
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. mark for My Articles similar articles
InternetNews
November 29, 2007
Andy Patrizio
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. mark for My Articles similar articles
CIO
August 27, 2010
Kim S. Nash
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. mark for My Articles similar articles
Bank Systems & Technology
May 20, 2010
Penny Crosman
BofA Hires Data Security Czar Gregory Garcia, former assistant secretary for the Office of Cybersecurity and Communications in the U.S. Department of Homeland Security, to lead bank efforts to keep data secure. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
InternetNews
July 14, 2005
Roy Mark
Cyber Security Gets Limelight in DHS Reorg Chertoff's organizational changes call for new cyber security position and increased information sharing. mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
April 24, 2009
Alex Goldman
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
CIO
September 1, 2005
Grant Gross
DHS Revamp Targets IT Cybersecurity The U.S. Department of Homeland Security announced a new position of assistant secretary for cyber and telecommunications security, thereby raising the standing of the cybersecurity chief on its organizational chart. mark for My Articles similar articles
InternetNews
November 17, 2009
U.S. Cybersecurity Can Halt 80% of Attacks at Best Senate panel probes ties between cybersecurity and terrorism as uncertainty continues about where authority should reside. mark for My Articles similar articles
InternetNews
March 5, 2010
FBI Director Seeks Industry Help on Cybersecurity In an address at the annual RSA show, FBI Director Robert Mueller outlines challenges the agency has in fighting cyber crime, seeks broader partnerships with private-sector firms. mark for My Articles similar articles
InternetNews
October 27, 2010
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. mark for My Articles similar articles
InternetNews
January 15, 2010
Larry Barrett
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats. mark for My Articles similar articles
National Defense
November 2015
Tomas O'Keefe
Three Homeland Security Agencies to Watch Knowing where to target sales activities as well as the challenges facing homeland security should help you identify existing opportunities to support DHS to ensure the safety and security of the American public. mark for My Articles similar articles
InternetNews
May 19, 2005
Roy Mark
House Approves Cybersecurity Promotion Legislation aims to raise profile of protecting federal networks from cyber attacks. mark for My Articles similar articles
Bank Technology News
May 1, 2008
Rebecca Sausner
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. mark for My Articles similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles similar articles
InternetNews
June 26, 2009
Kenneth Corbin
Feds Mulling Incentives for Secure Software Tax breaks for better software? That's one idea on the table as officials work to flesh out government role in public-private partnerships. mark for My Articles similar articles
InternetNews
March 17, 2009
Kenneth Corbin
Experts: Bureaucracy Thwarts U.S. Cybersecurity Insiders say agencies need to work in concert with the private sector to develop a more nimble set of defenses. mark for My Articles similar articles
The Motley Fool
April 22, 2009
Rich Smith
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. mark for My Articles similar articles
National Defense
June 2011
Stew Magnuson
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. mark for My Articles similar articles
InternetNews
March 24, 2010
U.S. Gov Says Cyber Security Experts in Demand Universities aren't graduating cybersecurity experts fast enough to help the government head off security threats, according to the Department of Homeland Security's Cybersecurity director. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
InternetNews
March 11, 2009
Kenneth Corbin
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. mark for My Articles similar articles
InternetNews
November 11, 2005
Roy Mark
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. mark for My Articles similar articles
National Defense
June 2015
Sandra I. Erwin
Industry Tees Up Policy Issues for 2016 The Beltway establishment is looking to a new administration to take on issues that have long been festering among defense contractors. mark for My Articles similar articles
InternetNews
September 30, 2009
FCC Panel: Cybersecurity Needs Incentives Cybersecurity experts warn FCC of market challenges to shoring up broadband networks. mark for My Articles similar articles
InternetNews
February 17, 2005
Michael Singer
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. mark for My Articles similar articles
InternetNews
October 21, 2010
Cybersecurity Field Needs to 'Professionalize' A panel of experts agreed there's a talent shortfall in cybersecurity, particularly in the government sector, and it's much broader than just technical expertise. mark for My Articles similar articles
InternetNews
May 3, 2010
Cybersecurity Seen Falling Short on Collaboration Across businesses and governments, one country to the next, the fight against hackers and cyber-attackers is a multi-front war, and a new global survey suggests that people just aren't talking to each other. mark for My Articles similar articles
InternetNews
May 4, 2009
Kenneth Corbin
Federal Cybersecurity a Tough Balance to Strike House panel seeks answers, advice from cybersecurity experts as government mulls major reorganization. mark for My Articles similar articles
InternetNews
April 8, 2010
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. mark for My Articles similar articles