MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
August 2013
Jeffrey G. Richardson
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
Fast Company
Sarah Kessler
Facebook, Twitter Would Be Forced To Report Terrorist Activity Under Proposed Bill Efforts in Washington have put a spotlight on the debate around the role of technology companies in aiding law enforcement's investigation of terrorist activity. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
Reason
October 2004
John Berlau
John Kerry's Dark Record on Civil Liberties The Democratic candidate is no friend to the Bill of Rights. mark for My Articles similar articles
BusinessWeek
January 10, 2005
Neal Sandler
Israel: A Bunch Of Blooms In The Desert After the worst recession in the country's history, Israel is staging an economic comeback. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
PC World
March 7, 2001
Jennifer O'Neill
FBI Battles Computer Crime 'Epidemic' Bureau works to balance tough stance with privacy rights, director says... mark for My Articles similar articles
PC World
September 12, 2001
Tom Spring & Frank Thorsberg
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Hillary Clinton: Silicon Valley Should Help Fight ISIS Clinton hinted that Silicon Valley should lower encryption standards to make it easier for American intelligence agencies to monitor communications. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
National Defense
September 2010
Eric Beidel
Social Scientists and Mathematicians Join The Hunt for Terrorists Internet chat rooms and other online discussion forums supplement, and in some cases, have replaced mosques, community centers and coffee shops as meeting spots for jihadists, experts say. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
Searcher
Nov/Dec 2008
Paul Piper
Nets of Terror Terrorist activity on the Internet. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
National Defense
October 2009
Tessa Gellerson
Law Enforcement Needs Guidance To Root Out Terrorist Plots, Says Report Good old fashioned police work has been far more effective in thwarting terrorist plots than high-tech data mining schemes. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
Salon.com
June 6, 2001
Flore de Preneuf
Brinkmanship of blood Pushed to the edge by rage and revenge, Palestinians and Israelis stare into the abyss of war... mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
InternetNews
September 21, 2010
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. mark for My Articles similar articles
BusinessWeek
September 9, 2010
Nichols & Ratnam
Obama Wins Praise for Export Controls Overhaul Defense and aerospace companies are giving the President rave reviews for his plan to ease export controls that executives call too broad and burdensome mark for My Articles similar articles
PC World
August 25, 2006
Narasu Rebbapragada
Encryption Apps Keep Files From Prying Eyes DESLock+, Namo FileLock, and T3 Basic Security all promise to lock down your personal data. mark for My Articles similar articles
BusinessWeek
November 19, 2007
Stephen H. Wildstrom
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. mark for My Articles similar articles
National Defense
July 2008
Sandra I. Erwin
Export Controls: a Contentious Issue Reaching a `Boiling Point' Stringent U.S. controls on exports of military technology may help keep advanced weapons out of enemy hands, but they also are making it tougher for the United States to get the best available weapons for its armed forces mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles
Parameters
Spring 2004
Matthew J. Morgan
The Origins of the New Terrorism A history of terrorism and where it's headed. mark for My Articles similar articles
PC World
November 7, 2006
Andrew Brandt
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. mark for My Articles similar articles
National Defense
August 2004
Roxana Tiron
Israeli Defense Forces Trying to Perfect Urban Combat Tactics, Techniques Israel Defense Forces have been working to perfect their urban warfare tactics, in an effort to eliminate militant cells in the disputed zones of the West Bank and Gaza Strip. mark for My Articles similar articles
PC World
March 2, 2001
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... mark for My Articles similar articles
Salon.com
September 11, 2001
Flore de Preneuf
Rejoicing in the streets of Jenin While many Palestinians celebrate the attack on the U.S., Yasser Arafat denounces it as "unacceptable" and Israelis mourn... mark for My Articles similar articles
Salon.com
October 8, 2001
Gary Kamiya
War and peace Our fight against terrorism gives the U.S. a historic opportunity to become a kinder, gentler force in the world... mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
PC World
March 2002
Kim Zetter
Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
Salon.com
September 14, 2001
Katharine Mieszkowski
Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much? mark for My Articles similar articles
Bank Technology News
November 2009
Rebecca Sausner
The End of the World Heartland Payment System's CEO predicts 2010 will be the year that the payments chain becomes significantly more secure. mark for My Articles similar articles
Salon.com
November 27, 2000
Flore de Preneuf
Middle East meets Wild West With the crisis simmering and the death toll mounting in Israel, vigilante movements are brewing among Israelis and Palestinians alike... mark for My Articles similar articles
Parameters
Winter 2004/2005
Doron Almog
Cumulative Deterrence and the War on Terrorism A cumulative deterrence strategy designed for the war on terrorism would build on victories achieved over the short, medium, and long terms that gradually wear down the enemy. mark for My Articles similar articles
InternetNews
September 23, 2005
Sean Michael Kerner
Credit Companies Tighten Encryption Equifax, Experian and TransUnion create a new standard to securing sensitive customer data. mark for My Articles similar articles
Salon.com
October 15, 2002
Aluf Benn
When friends collide With Israeli and American interests diverging, stakes will be high and negotiations tricky when President Bush and Ariel Sharon meet this week. mark for My Articles similar articles
Military & Aerospace Electronics
April 2007
Amr El-Ashmawi
Designers Can Protect IP with FPGAs and Bitstream Encryption Trends are moving toward greater commercial-off-the-shelf (COTS) security, ease-of-design, and lower cost, thanks to advances in field-programmable-gate-array (FPGA) design. mark for My Articles similar articles
Salon.com
November 6, 2001
Gary Kamiya
It's time for U.S. to broker Mideast peace, says Palestinian leader Hanan Mikhail-Ashrawi tells Osama bin Laden he does "not have the right to use" the Palestinian plight "for your ends"... mark for My Articles similar articles
National Defense
February 2004
Rand H. Fishbein
Legendary Israeli Tank Threatened With Extinction If Israel's Finance Ministry ultimately has its way, the famed Merkava Mk. 4 tank may soon be a thing of the past. mark for My Articles similar articles
PC Magazine
September 18, 2008
Neil Randall
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. mark for My Articles similar articles
BusinessWeek
February 23, 2004
Kripalani & Sandler
Building Fences -- And Growing Closer From security to information technology, business ties between India and Israel are proliferating mark for My Articles similar articles
InternetNews
June 6, 2009
Alex Goldman
Enterprise Security Should Be Better and Cheaper Dr. Peter Tippett says he has the data to disprove many myths that govern security best practices. mark for My Articles similar articles
PC Magazine
April 30, 2009
Nicole Price Fasig
Give Your Data a Safe Trip These secure hard drives will keep your files from falling into the wrong hands on the road. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles