Similar Articles |
|
National Defense August 2013 Jeffrey G. Richardson |
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. |
Fast Company Sarah Kessler |
Facebook, Twitter Would Be Forced To Report Terrorist Activity Under Proposed Bill Efforts in Washington have put a spotlight on the debate around the role of technology companies in aiding law enforcement's investigation of terrorist activity. |
CIO July 15, 2001 Fred Hapgood |
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... |
Reason October 2004 John Berlau |
John Kerry's Dark Record on Civil Liberties The Democratic candidate is no friend to the Bill of Rights. |
BusinessWeek January 10, 2005 Neal Sandler |
Israel: A Bunch Of Blooms In The Desert After the worst recession in the country's history, Israel is staging an economic comeback. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
PC World March 7, 2001 Jennifer O'Neill |
FBI Battles Computer Crime 'Epidemic' Bureau works to balance tough stance with privacy rights, director says... |
PC World September 12, 2001 Tom Spring & Frank Thorsberg |
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... |
PC World July 9, 2002 Lincoln Spector |
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. |
CIO October 1, 2003 Lorraine Cosgrove Ware |
By the Numbers It's not just what you send, it's what you store that needs encryption. |
Fast Company Neal Ungerleider |
Hillary Clinton: Silicon Valley Should Help Fight ISIS Clinton hinted that Silicon Valley should lower encryption standards to make it easier for American intelligence agencies to monitor communications. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
National Defense September 2010 Eric Beidel |
Social Scientists and Mathematicians Join The Hunt for Terrorists Internet chat rooms and other online discussion forums supplement, and in some cases, have replaced mosques, community centers and coffee shops as meeting spots for jihadists, experts say. |
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... |
Searcher Nov/Dec 2008 Paul Piper |
Nets of Terror Terrorist activity on the Internet. |
CRM March 2, 2012 Raul Ortega |
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. |
National Defense October 2009 Tessa Gellerson |
Law Enforcement Needs Guidance To Root Out Terrorist Plots, Says Report Good old fashioned police work has been far more effective in thwarting terrorist plots than high-tech data mining schemes. |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it? |
Salon.com June 6, 2001 Flore de Preneuf |
Brinkmanship of blood Pushed to the edge by rage and revenge, Palestinians and Israelis stare into the abyss of war... |
Information Today March 2006 Phillip Britt |
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. |
InternetNews September 21, 2010 |
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. |
BusinessWeek September 9, 2010 Nichols & Ratnam |
Obama Wins Praise for Export Controls Overhaul Defense and aerospace companies are giving the President rave reviews for his plan to ease export controls that executives call too broad and burdensome |
PC World August 25, 2006 Narasu Rebbapragada |
Encryption Apps Keep Files From Prying Eyes DESLock+, Namo FileLock, and T3 Basic Security all promise to lock down your personal data. |
BusinessWeek November 19, 2007 Stephen H. Wildstrom |
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. |
National Defense July 2008 Sandra I. Erwin |
Export Controls: a Contentious Issue Reaching a `Boiling Point' Stringent U.S. controls on exports of military technology may help keep advanced weapons out of enemy hands, but they also are making it tougher for the United States to get the best available weapons for its armed forces |
PC World December 7, 2007 Becky Waring |
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. |
Parameters Spring 2004 Matthew J. Morgan |
The Origins of the New Terrorism A history of terrorism and where it's headed. |
PC World November 7, 2006 Andrew Brandt |
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. |
National Defense August 2004 Roxana Tiron |
Israeli Defense Forces Trying to Perfect Urban Combat Tactics, Techniques Israel Defense Forces have been working to perfect their urban warfare tactics, in an effort to eliminate militant cells in the disputed zones of the West Bank and Gaza Strip. |
PC World March 2, 2001 |
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... |
Salon.com September 11, 2001 Flore de Preneuf |
Rejoicing in the streets of Jenin While many Palestinians celebrate the attack on the U.S., Yasser Arafat denounces it as "unacceptable" and Israelis mourn... |
Salon.com October 8, 2001 Gary Kamiya |
War and peace Our fight against terrorism gives the U.S. a historic opportunity to become a kinder, gentler force in the world... |
Information Today May 16, 2011 |
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. |
PC World March 2002 Kim Zetter |
Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? |
Military & Aerospace Electronics December 2007 Courtney E. Howard |
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. |
Salon.com September 14, 2001 Katharine Mieszkowski |
Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much? |
Bank Technology News November 2009 Rebecca Sausner |
The End of the World Heartland Payment System's CEO predicts 2010 will be the year that the payments chain becomes significantly more secure. |
Salon.com November 27, 2000 Flore de Preneuf |
Middle East meets Wild West With the crisis simmering and the death toll mounting in Israel, vigilante movements are brewing among Israelis and Palestinians alike... |
Parameters Winter 2004/2005 Doron Almog |
Cumulative Deterrence and the War on Terrorism A cumulative deterrence strategy designed for the war on terrorism would build on victories achieved over the short, medium, and long terms that gradually wear down the enemy. |
InternetNews September 23, 2005 Sean Michael Kerner |
Credit Companies Tighten Encryption Equifax, Experian and TransUnion create a new standard to securing sensitive customer data. |
Salon.com October 15, 2002 Aluf Benn |
When friends collide With Israeli and American interests diverging, stakes will be high and negotiations tricky when President Bush and Ariel Sharon meet this week. |
Military & Aerospace Electronics April 2007 Amr El-Ashmawi |
Designers Can Protect IP with FPGAs and Bitstream Encryption Trends are moving toward greater commercial-off-the-shelf (COTS) security, ease-of-design, and lower cost, thanks to advances in field-programmable-gate-array (FPGA) design. |
Salon.com November 6, 2001 Gary Kamiya |
It's time for U.S. to broker Mideast peace, says Palestinian leader Hanan Mikhail-Ashrawi tells Osama bin Laden he does "not have the right to use" the Palestinian plight "for your ends"... |
National Defense February 2004 Rand H. Fishbein |
Legendary Israeli Tank Threatened With Extinction If Israel's Finance Ministry ultimately has its way, the famed Merkava Mk. 4 tank may soon be a thing of the past. |
PC Magazine September 18, 2008 Neil Randall |
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. |
BusinessWeek February 23, 2004 Kripalani & Sandler |
Building Fences -- And Growing Closer From security to information technology, business ties between India and Israel are proliferating |
InternetNews June 6, 2009 Alex Goldman |
Enterprise Security Should Be Better and Cheaper Dr. Peter Tippett says he has the data to disprove many myths that govern security best practices. |
PC Magazine April 30, 2009 Nicole Price Fasig |
Give Your Data a Safe Trip These secure hard drives will keep your files from falling into the wrong hands on the road. |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. |