| Similar Articles |
 |
InternetNews September 24, 2010 |
Obama Admin Mulls Cybersecurity, Senate Bill Stalls Head of U.S. Cyber Command describes White House-led review of current cybersecurity authorities, while efforts in the Senate for comprehensive reform appear to have hit a roadblock.  |
InternetNews June 4, 2010 |
DoD Cyber Czar Sounds Alarm Charged with leading the Defense Department's new and long overdue cybersecurity unit, Gen. Keith Alexander made it clear that there's plenty for our country to worry about.  |
InternetNews June 30, 2009 Kenneth Corbin |
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.'  |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future?  |
InternetNews September 7, 2010 |
Cybersecurity Czar: Privacy Won't Be a Casualty NSA Director Gen. Keith Alexander reaffirmed his view that protecting U.S. government, military and civilian data networks doesn't mean sacrificing citizens' right to privacy.  |
InternetNews January 27, 2010 |
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive?  |
InternetNews October 9, 2009 Larry Barrett |
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention.  |
InternetNews August 4, 2009 |
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say.  |
National Defense June 2013 Valerie Insinna |
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought.  |
National Defense February 2011 Lawrence P. Farrell Jr. |
To Improve Cyber-Security, U.S. Needs Cohesive Public-Private Partnership NDIA member companies recently put together a white paper on the necessity to better acquire and field cyber-capabilities.  |
InternetNews July 29, 2010 |
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks.  |
Military & Aerospace Electronics October 2009 J.R. Wilson |
Military Information Security Command Opens for Business at Lackland AFB The U.S. Air Force ended two years of confusion and controversy by designating Lackland Air Force Base as its official operational cyber security center, consolidating all U.S. military cyberspace operations and computer security.  |
Popular Mechanics September 2008 Glenn Derene |
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs  |
National Defense June 2009 Stew Magnuson |
U.S. Plans to Destroy Enemy Computer Networks in Cyber-Attacks Questioned But secrecy may have impeded widespread debate about the nature and implications of cyber-attack.  |
InternetNews February 24, 2010 |
Lawmakers Dig In On Cybersecurity Bill Supporters of the Cybersecurity Act of 2009 remain steadfast in their support of a bill that would expand President Obama's authority to intervene in the event of a major cyber attack.  |
InternetNews October 27, 2010 |
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack.  |
Bank Technology News January 2009 Rebecca Sausner |
Getting the Ear of the New President President-elect Barack Obama is given advice on how to address the daily cyber threats and attacks against the nation's government, military and civilian networks.  |
InternetNews June 8, 2010 |
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats.  |
National Defense May 2009 Sandra I. Erwin |
Pentagon Should 'Institutionalize' Cultural Training for Troops, Advisory Panel Says The Iraq war made it clear that the U.S. military neglected to study that country's culture before it deployed forces there.  |
National Defense February 2008 Breanne Wagner |
Special Operators Ponder the Right Mix of Roles and Missions U.S. Special Operations Command is growing. From 48,000 personnel today, its numbers are expected to increase to 58,000 in the coming years. But how will they be used?  |
InternetNews April 8, 2009 Alex Goldman |
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington.  |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation.  |
Popular Mechanics April 21, 2009 Glenn Derene |
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats.  |
InternetNews September 29, 2010 |
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure.  |
National Defense October 2007 Sandra I. Erwin |
Why Is Congress Launching Yet Another Roles-and-Missions Probe? Congress may have the power of the purse, but it has been largely powerless in just about every attempt to influence the course of the war in Iraq and to substantially reshape military spending priorities.  |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data.  |
National Defense January 2016 Allyson Versprille |
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said.  |
National Defense June 2004 Harold Kennedy |
Advisory Board Says Military Must Define Role in Homeland Defense The Pentagon needs to improve and integrate its maritime intelligence, surveillance and reconnaissance assets with those of the Departments of Homeland Security and Transportation, CIA and FBI, according to a recent Defense Science Board study.  |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking.  |
National Defense February 2009 Sandra I. Erwin |
Foreign Policy Ambition Overlooks War Lessons The Obama administration has endorsed a major expansion of ground forces, and a surge in military capabilities to conduct "irregular" warfare against non-state actors.  |
National Defense August 2007 Grace Jean |
Defense Technologies for an Uncertain Future The United States is at a crossroads when it comes to developing defense technologies for a future that seems obscure at best.  |
National Defense June 2011 Sandra I. Erwin |
Cries of 'Hollow Military' Stifle Rational Debate on Future Spending President Obama has called for $400 billion in Pentagon cuts over the next 12 years, and to some defense officials and lawmakers, this is just the opening salvo of a campaign to tear down the U.S. military.  |
National Defense March 2008 Stew Magnuson |
Goal of a `Network-Centric' Military Seems Distant Unblocking communications and data sharing barriers is necessary if the military will achieve its longtime goal of becoming a network-centric force.  |
National Defense September 2010 Sandra I. Erwin |
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks.  |
InternetNews March 11, 2009 Kenneth Corbin |
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community.  |
National Defense February 2009 Sandra I. Erwin |
Special Ops Command:No New Equipment Needed The Pentagon began a major expansion of U.S. special operations forces two years ago, but contractors won't see increased purchases of new high-tech equipment for SOF units.  |
InternetNews January 25, 2010 |
China Says Not Behind Cyber Attacks The alleged Chinese cyber attack on Google and other top U.S. Internet firms - and larger issues of China's Internet censorship - continue to fuel the escalating war of words between U.S. and Chinese officials.  |
National Defense December 2009 Stew Magnuson |
Integrating Civilian Agencies Into Military Operations Remains Difficult The United States' "whole government" approach to rebuilding war-torn nations is nevertheless moving forward.  |
Military & Aerospace Electronics November 2009 John Keller |
DOD Information Security Aims to Boost Embedded Computing Cyber Defense Against Computer Hackers The Pentagon's Defense Research & Engineering section is continuing an initiative to plug holes in U.S. military cyber defense by concealing the installation and deployment of information security measures.  |
National Defense December 2006 Sandra I. Erwin |
Latest Pentagon `Roadmap' Reveals Serious Frustration Roadmaps -- which involve lengthy studies and exhaustive reports -- can be quite useful in highly technical areas that require in-depth research. The latest Pentagon roadmap, however, seeks to address the decidedly non-technical issue of "irregular warfare."  |
InternetNews March 19, 2009 Kenneth Corbin |
Experts See Shortfall in Cybersecurity Research With the nation under constant attack, witnesses call on Commerce Committee to prioritize cybersecurity and promote education in the field.  |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses.  |
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally.  |
National Defense May 2015 Sandra I. Erwin |
Procurement Issues That Congress Won't Fix The new foreign policy mantra in Washington is that the world is on fire. The nation's weapons procurement machine, meanwhile, keeps partying like it's 1999.  |
Military & Aerospace Electronics February 2010 John Keller |
DARPA moves ahead with National Cyber Range project for advanced cyber security research The U.S. Defense Advanced Research Project Agency in Arlington, Va., is awarding multimillion-dollar contracts to two research organizations to build prototype advanced computing centers to demonstrate and test cyber security, defensive information warfare, and information assurance technologies.  |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years.  |
National Defense November 2014 Sandra I. Erwin |
Top 10 Disruptive Technologies for a New Era of Global Instability How the nation's military will keep up in a rapidly changing and dangerous world is the proverbial 64-million-dollar question.  |
Wired August 23, 2007 Ralph Peters |
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare.  |
InternetNews February 17, 2010 |
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take.  |
National Defense August 2009 Sandra I. Erwin |
Future War: How The Game is Changing "It's hard to concentrate on a grand strategy when your house is on fire," said Marine Corps Gen. James Mattis, head of U.S. Joint Forces Command. Even as they cope with the frantic demands of two major wars, military leaders say they have a clearer sense of the future than they did in the 1990s.  |