TITLE

Cyber Security Industry Day Planned by DHS

PUB. DATE
November 2010
SOURCE
TR2: Terror Response Technology Report;11/10/2010, Vol. 6 Issue 23, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the U.S. Department of Homeland Security's (DHS) Cyber Security Industry Day to be held on November 17, 2010 at a hotel in Washington, D.C.
ACCESSION #
55293252

 

Related Articles

  • DHS Plans Industry Day for Acquisition Planning.  // TR2: Terror Response Technology Report;11/10/2010, Vol. 6 Issue 23, p11 

    The article offers information on the Department of Homeland Security's (DHS) Fourth Annual Industry Day for Acquisition Planning, to be held on November 17, 2010.

  • DHS Making Strides In Information Security, IG Finds.  // Defense Daily;10/9/2008, Vol. 240 Issue 7, p5 

    The article discusses the result of the Department of Homeland Security (DHS) Inspector General's annual report, which states that DHS is making developments regarding their compliance on federal security regulations for information security in the U.S. It cites four areas wherein progress is...

  • DHS revamp on tap. Carlson, Caron // eWeek;5/26/2003, Vol. 20 Issue 21, p33 

    After months of criticism from the information technology industry that the U.S. administration is devoting insufficient resources and attention to cyber-security, the Department of Homeland Security is already restructuring to give network safety a higher profile. Federal research officials...

  • DHS Seeks More Standardization for its Computer Systems through FirstSource II.  // TR2: Terror Response Technology Report;10/26/2011, Vol. 7 Issue 22, p3 

    The article discusses plans by the U.S. Department of Homeland Security (DHS) to acquire more standardized computers and related equipment as part of a follow-on procurement to its FirstSource program. It cites the FirstSource 2 as an acquisition strategy document that will incorporate salient...

  • WildCAT Prowls for Wireless Predators. Seffers, George I. // Signal;Aug2012, Vol. 66 Issue 12, p25 

    The article reports that the U.S. Department of Homeland Security (DHS) has developed a technology for finding unauthorized wireless devices on critical infrastructure networks. DHS reveals that the cyber access tracking technology termed WildCAT combines physical security forces and...

  • DHS S&T Awards 29 Organizations $40 Million In Cyber R&D Contracts.  // Defense Daily;10/25/2012, Vol. 256 Issue 19, p10 

    The article reports on the awards provided by the U.S. Department of Homeland Security (DHS) Science and Technology (S&T) worth a combined $40 million to 29 organization 34 contracts to improve the security of federal networks and the Internet.

  • HAND-TO-KEYBOARD COMBAT. Schlesinger, Henry // Popular Science;Nov2008, Vol. 273 Issue 5, p33 

    The article focuses on the U.S. Department of Homeland Security's launching of the National Cyber Security Center (NCSC), part of the partially-classified Comprehensive National Cybersecurity Initiative (CNCI) started by presidential directive in January, 2008. The article notes that...

  • If It Ain't Broke …. Downes, Larry // CIO Insight;Sep2006, Issue 72, p37 

    The article highlights some points on the failure of the Department of Homeland Security (DHS) in addressing the computer-security incidents that involves the federal agencies in the U.S. First cited in the artice is that DHS has not find its replacement for retired DHS secretary Michael...

  • Why can't hackers us their talents to make better that which isn't perfect? Politis, David // Enterprise/Salt Lake City;9/01/2003, Vol. 33 Issue 10, p11 

    Comments on the potential role of computer hackers in improving society. Need for the assistance of the U.S. Department of Homeland Security in detecting computer hackers; Possible contribution of hackers to technological and medical innovations; Suggestions that hackers should develop programs...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics