MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
IEEE Spectrum
August 2012
Willie D. Jones
Declarations of Cyberwar What the revelations about the U.S.-Israeli origin of Stuxnet mean for warfare mark for My Articles similar articles
IEEE Spectrum
September 2010
Robert W. Lucky
Cyber Armageddon The author reflects on the latest fashion in end-of-the-world scenarios mark for My Articles similar articles
InternetNews
August 4, 2009
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. mark for My Articles similar articles
InternetNews
October 27, 2010
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. mark for My Articles similar articles
InternetNews
March 12, 2009
Kenneth Corbin
Lessons From the Russia-Georgia Cyberwar Georgian official and U.S. security experts look back at the Internet attack that preceded the military conflict. mark for My Articles similar articles
PC World
August 21, 2007
Robert McMillan
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. mark for My Articles similar articles
InternetNews
March 11, 2009
Kenneth Corbin
Federal Cybersecurity: Not for the Spooks? Security experts warn lawmakers against placing too much control over federal cybersecurity in the hands of the intelligence community. mark for My Articles similar articles
InternetNews
February 10, 2006
Roy Mark
DoJ Wants Cyber Crime Stats The Department of Justice is launching its first national survey to measure the prevalence and impact of cyber crime on U.S. businesses. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
National Defense
December 2013
Maggie Heyn Richardson
New Hub For Training Cyberworkers Emerges in Northern Louisiana Louisiana Tech University is a designated Center of Academic Excellence in Information Assurance by the Department of Homeland Security and the National Security Agency and major defense contractors are located at the The National Cyber Research Park in Bossier City. mark for My Articles similar articles
Popular Mechanics
April 2009
Glenn Derene
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
National Defense
March 2012
Stew Magnuson
Can Peace Prevail in Cyberspace? The prospect of an assault on the United States through its networks has been a doomsday scenario for a number of years. mark for My Articles similar articles
InternetNews
June 30, 2009
Kenneth Corbin
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' mark for My Articles similar articles
National Defense
February 2010
Stew Magnuson
Malicious Firmware Could Sabotage Military, Security Systems Microscopically small and enormously complex circuits inserted surreptitiously into military or security hardware could potentially turn U.S. weapons against their users. mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
The Motley Fool
August 4, 2008
Rich Smith
Borg: Assimilating and A-Scintillating In short, now's not a particularly good time to have anything to do with the auto industry. mark for My Articles similar articles
InternetNews
June 8, 2010
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. mark for My Articles similar articles
InternetNews
April 15, 2010
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. mark for My Articles similar articles
Popular Mechanics
April 21, 2009
Glenn Derene
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
CIO
October 15, 2003
Ben Worthen
Security Alerts New warning system taps security contractors for attack data mark for My Articles similar articles
InternetNews
September 29, 2010
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. mark for My Articles similar articles
InternetNews
October 21, 2010
Cybersecurity Field Needs to 'Professionalize' A panel of experts agreed there's a talent shortfall in cybersecurity, particularly in the government sector, and it's much broader than just technical expertise. mark for My Articles similar articles
InternetNews
October 9, 2009
Larry Barrett
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. mark for My Articles similar articles
Wired
August 23, 2007
Ralph Peters
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. mark for My Articles similar articles
National Defense
May 2010
Austin Wright
Industry Reacts To Proposed Regulations As Congress moves forward with a long-awaited cybersecurity bill, industry leaders are voicing mixed views about the proposed measure. mark for My Articles similar articles
InternetNews
February 17, 2011
RSA: Security Experts Debate Cyberwar Threat From corporate espionage to WikiLeaks, experts at the RSA conference debate the challenge of maintaining computer security. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
The Motley Fool
August 1, 2007
Rich Smith
This Borg Is Too Pretty BorgWarner shares have retreated 8% off their all-time high two weeks ago. Last week's quarterly report was outstanding, and future prospects are excellent for the auto parts producer, but valuation is currently too high. mark for My Articles similar articles
National Defense
October 2010
Stew Magnuson
Expert Warns of Nexus Between Cybercriminals and Terrorists Terrorists who want to stage a cyberattack against the United States may lean on criminal networks to assist them, a former Defense Department official said. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
InternetNews
July 14, 2005
Roy Mark
Cyber Security Gets Limelight in DHS Reorg Chertoff's organizational changes call for new cyber security position and increased information sharing. mark for My Articles similar articles
National Defense
June 2011
Stew Magnuson
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. mark for My Articles similar articles
The Motley Fool
April 26, 2006
Rich Smith
Foolish Forecast: Return of the Borg Over the past 52 weeks, auto-parts industry powerhouse BorgWarner's stock has beaten the S&P 500 by nearly a 20% margin. Investors, take note. mark for My Articles similar articles
CIO
October 1, 2005
Ben Worthen
The Sky Really Is Falling Ed Lazowska, cochairman of the President's Information Technology Advisory Committee, says that there is a looming security crisis, and the government, vendors and CIOs aren't doing enough to stop it. mark for My Articles similar articles
InternetNews
January 27, 2010
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? mark for My Articles similar articles
CIO
August 27, 2010
Kim S. Nash
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. mark for My Articles similar articles
InternetNews
March 24, 2010
U.S. Gov Says Cyber Security Experts in Demand Universities aren't graduating cybersecurity experts fast enough to help the government head off security threats, according to the Department of Homeland Security's Cybersecurity director. mark for My Articles similar articles
The Motley Fool
July 13, 2009
Rich Smith
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. mark for My Articles similar articles