MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Military & Aerospace Electronics
October 2005
John Keller
DARPA Scientists Seek Next Generation of Wireless Data Networking DARPA wants to take research to the next level by developing a revolutionary mobile ad-hoc network prototype that improves effective performance by an order of magnitude or more relative to the current state of the art. mark for My Articles similar articles
InternetNews
October 27, 2010
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. mark for My Articles similar articles
National Defense
March 2009
Grace V. Jean
Building a Cybersecurity Lab In an effort to beef up the country's defenses in cyberspace, the Comprehensive National Cybersecurity Initiative, established last year by the Bush administration, seeks to reduce network vulnerabilities, protect against intrusions and anticipate future threats. mark for My Articles similar articles
InternetNews
June 8, 2010
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. mark for My Articles similar articles
InternetNews
September 29, 2010
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. mark for My Articles similar articles
InternetNews
October 9, 2009
Larry Barrett
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. mark for My Articles similar articles
National Defense
January 2016
Allyson Versprille
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. mark for My Articles similar articles
InternetNews
April 15, 2010
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. mark for My Articles similar articles
InternetNews
January 27, 2010
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? mark for My Articles similar articles
Military & Aerospace Electronics
September 2006
DARPA selects Raytheon to Develop Secure Enterprise Network The award also calls for Raytheon to maintain and transition DARPA's existing networks to meet future requirements, which could potentially bring the contract value to more than $57 million. mark for My Articles similar articles
InternetNews
April 24, 2009
Alex Goldman
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. mark for My Articles similar articles
InternetNews
June 30, 2009
Kenneth Corbin
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' mark for My Articles similar articles
T.H.E. Journal
December 8, 2009
Dian Schaffhauser
Virginia Puts State Support Behind School Cyber Security Program The Virginia Department of Education and the state office of the Attorney General have put their support behind a program to bring cyber security experts into classrooms. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
National Defense
February 2015
Yasmin Tadjdeh
Training and Simulation Industry Optimistic About Future Opportunities Smaller defense budgets are forcing the military to conduct fewer costly live exercises and instead put troops in the cockpits and drivers' seats of more affordable simulators. mark for My Articles similar articles
T.H.E. Journal The Center for Information Assurance and Security (CIAS) CIAS has been founded at the University of Texas at Austin to address the nation's growing problems with cyber security. mark for My Articles similar articles
The Motley Fool
November 14, 2011
Katie Spence
Cyber Attacks Capable of Crashing the U.S. Economy? With cyber attacks becoming more prevalent, these companies are stepping in to provide solutions. mark for My Articles similar articles
Bank Technology News
May 1, 2008
Rebecca Sausner
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. mark for My Articles similar articles
National Defense
December 2013
Maggie Heyn Richardson
New Hub For Training Cyberworkers Emerges in Northern Louisiana Louisiana Tech University is a designated Center of Academic Excellence in Information Assurance by the Department of Homeland Security and the National Security Agency and major defense contractors are located at the The National Cyber Research Park in Bossier City. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
Military & Aerospace Electronics
November 2009
John Keller
DOD Information Security Aims to Boost Embedded Computing Cyber Defense Against Computer Hackers The Pentagon's Defense Research & Engineering section is continuing an initiative to plug holes in U.S. military cyber defense by concealing the installation and deployment of information security measures. mark for My Articles similar articles
The Motley Fool
August 2, 2006
Jack Uldrich
Lockheed Plants a Small Seed The aerospace giant's latest government grant could sprout a new line of business. Investors, take note. mark for My Articles similar articles
InternetNews
April 23, 2010
SMBs Often a Weak Link in Cyber Security Lax data security and a lack of resources could be exposing small and midsized businesses - and their customers - to risk. mark for My Articles similar articles
National Defense
April 2014
Stew Magnuson
Report Ponders What Follows a Cyber Attack on Electric Grid Experts are convinced that a cyber attack on a U.S. electric grid that could cut off power to millions is a near certainty. mark for My Articles similar articles
InternetNews
March 11, 2009
Kenneth Corbin
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Prasad Balakrishnan
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. mark for My Articles similar articles
InternetNews
February 10, 2006
Roy Mark
DoJ Wants Cyber Crime Stats The Department of Justice is launching its first national survey to measure the prevalence and impact of cyber crime on U.S. businesses. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
July 29, 2010
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks. mark for My Articles similar articles
National Defense
August 2015
Sandra I. Erwin
Dirty Little Secrets of the Cyber Business The federal government can be the ticket to prosperity. Not so much for the amount of money it spends, but because government networks are ground zero for the cyber wars that are being fought on a daily basis. mark for My Articles similar articles
National Defense
May 2014
Stew Magnuson
New Cyber Hygiene Campaign Seeks to Curtail Attacks The Center for Internet Security and the Council on CyberSecurity, working with the Department of Homeland Security, the National Governors Association and the Governors Homeland Security Advisors Council launched the Cyber Hygiene Campaign in April. mark for My Articles similar articles
InternetNews
June 6, 2005
Roy Mark
Former Cyber Chief Raises 'Perfect Storm' Three former Bush administration top cyber security officials don't think the White House or the top levels of the private sector are putting enough priority on securing the nation's networks. mark for My Articles similar articles
InternetNews
March 24, 2010
U.S. Gov Says Cyber Security Experts in Demand Universities aren't graduating cybersecurity experts fast enough to help the government head off security threats, according to the Department of Homeland Security's Cybersecurity director. mark for My Articles similar articles
InternetNews
December 7, 2004
Roy Mark
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
InternetNews
February 17, 2005
Michael Singer
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
InternetNews
July 14, 2005
Roy Mark
Cyber Security Gets Limelight in DHS Reorg Chertoff's organizational changes call for new cyber security position and increased information sharing. mark for My Articles similar articles
BusinessWeek
April 10, 2008
China's Response to BusinessWeek A spokesperson of the Chinese Embassy to the United States responds to questions sent to authorities in Beijing and Washington regarding cyber crimes. mark for My Articles similar articles
The Motley Fool
December 31, 2008
Rich Smith
Obama's Stance on Your Cyber-Security Online security could be one of the hottest growth fields over the next four years. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles
InternetNews
May 1, 2009
Alex Goldman
Defense Industry Data Needs Its Own Defenses The U.S. military only recently began to coordinate cybersecurity with private companies. mark for My Articles similar articles
National Defense
February 2011
Lawrence P. Farrell Jr.
To Improve Cyber-Security, U.S. Needs Cohesive Public-Private Partnership NDIA member companies recently put together a white paper on the necessity to better acquire and field cyber-capabilities. mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
John Keller
DARPA Seeks to Push State of the Art in Emissive Micro-Displays for Moving 3D Images Scientists at the U.S. Defense Advanced Research Projects Agency are asking industry for revolutionary advances in high-resolution affordable emissive micro-displays (EMDs) for dynamic holography. mark for My Articles similar articles
InternetNews
March 23, 2010
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. mark for My Articles similar articles
InternetNews
December 1, 2009
Cyber Monday Rakes in the Cash It's an e-tailer's dream as the day's sales totals soar from last year and top even Black Friday's take. mark for My Articles similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles similar articles
National Defense
May 2014
Reeder & Bradel
Cyber Security Regime Undergoing Changes The rules governing the security of the information technology systems of contractors and the private sector are in a continual state of flux as the federal government struggles to get its arms around an ever-changing landscape. mark for My Articles similar articles
InternetNews
March 3, 2010
Obama Cyber Aide Declassifies Security Report White House cyber coordinator Howard Schmidt makes news at the RSA show, announcing the declassification of the cybersecurity plan developed two years ago. mark for My Articles similar articles