MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
October 29, 2014
Dunst & Brook
Confidential Business Data at Risk at the Border U.S. agents can search and seize the laptops of international travelers at the border, so take precautions to protect confidential business information mark for My Articles similar articles
InternetNews
September 18, 2009
Do You Need to Fear Being Hacked From China? The U.S. government says China is capable of stealing your secrets - and may successfully do so, unless you take precautions. mark for My Articles similar articles
InternetNews
September 22, 2006
Roy Mark
Where Have All The Laptops Gone? The Department of Commerce reports more than 1,000 computers are lost, stolen or missing. mark for My Articles similar articles
National Defense
August 2013
Jeffrey G. Richardson
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. mark for My Articles similar articles
InternetNews
April 7, 2008
China Allows Access to English Wikipedia As Olympics near, Chinese authorities ease 'Net restrictions on online encyclopedia. mark for My Articles similar articles
CFO
October 1, 2007
Wu Chen
View from China: What Price Glory? The Beijing Summer Olympics will undoubtedly be a success -- but at what cost? mark for My Articles similar articles
InternetNews
February 4, 2009
Richard Adhikari
Napolitano Urged to Act on Border Laptop Seizures Homeland security advisers press for greater oversight by privacy officials. mark for My Articles similar articles
Insurance & Technology
May 18, 2004
Paul McDougall
Laptop Theft Compromises Data GMAC Financial Services customers have personal data stolen. mark for My Articles similar articles
InternetNews
December 28, 2007
Mike Elgan
Here Comes The 2008 Beijing Olympic Disaster A half-million visitors will upload everything they see to YouTube, LiveLeak and Flickr. What happens when the "Great Firewall of China" is breached? mark for My Articles similar articles
InternetNews
June 22, 2006
Clint Boulton
Two FTC Laptops Stolen The Federal Trade Commission today said two if its attorneys' laptops containing the personal information of 110 people were stolen from a locked vehicle last week. mark for My Articles similar articles
InternetNews
October 3, 2008
Richard Adhikari
Arbitrary Seizure of Travelers' Laptops Ending? Fourth Amendment rights could be restored at the border. mark for My Articles similar articles
Entrepreneur
August 2007
Amanda C. Kooser
Safe Trip Encrypt, secure, and back-up! Prevention is the key when it comes to the security of your small business data and hardware while traveling. mark for My Articles similar articles
InternetNews
September 25, 2009
DHS Privacy Report Downplays Laptop Searches The Department of Homeland Security brushes off criticism from civil liberties groups in 99-page report to Congress. mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
InternetNews
February 13, 2007
Ed Sutherland
FBI Laptops Make Most Wanted List Audit reports lost and stolen FBI laptops included computers in anti-terror and counter-spy programs. mark for My Articles similar articles
InternetNews
April 5, 2007
Roy Mark
IRS Audits Self Into Data-Theft Hot Seat New audit finds IRS with 500 missing or stolen laptops, some with unencrypted taxpayer confidential information. mark for My Articles similar articles
Wired
October 23, 2007
Oliver August
The Great Firewall: China's Misguided -- and Futile -- Attempt to Control What Happens Online The Chinese government's ability to monitor and control electronic communication is impressive and a little frightening. mark for My Articles similar articles
InternetNews
November 24, 2009
Many Enterprises Clueless on Mobile Data: Study Survey finds that two in three European companies have no clue what and how much corporate data is housed on employees' mobile devices. mark for My Articles similar articles
National Defense
July 2006
Harold Kennedy
Biometric Check on U.S. Visitors Drawing Criticism A controversial effort by the Department of Homeland security to create a biometric computer system to keep tabs on all foreigners entering and leaving the country is drawing increasing flak at home and abroad. mark for My Articles similar articles
Investment Advisor
March 1, 2011
Lewis Schiff
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. mark for My Articles similar articles
Inc.
August 2008
Michael Fitzgerald
Help! Somebody Save Our Files! How to handle and prevent the most common data disasters. mark for My Articles similar articles
National Defense
September 2011
Eric Beidel
Homeland Security Market 'Vibrant' Despite Budget Concerns The abundance of small, medium and large firms vying for DHS contracts is creating healthy competition. mark for My Articles similar articles
National Defense
March 2005
Joe Pappalardo
U.S.-Canadian Border Crossings to Tighten Security The bridges and border control stations on the U.S.-Canada border are undergoing strategic overhauls, not only to increase security but also to ensure rapid throughput of commercial traffic, leaders from both nations recently announced. mark for My Articles similar articles
National Defense
April 2005
Joe Pappalardo
Homeland Security The U.S. Department of Homeland Security proposed a 2006 budget that includes increased spending on technology. mark for My Articles similar articles
InternetNews
June 1, 2004
Roy Mark
Accenture Lands Potential $10B Federal Contract Company to employ biometrics as part of Department of Homeland Defense's virtual border program. mark for My Articles similar articles
Reason
February 2008
Kerry Howley
Artifact: The Counterfeit Olympics Beijing authorities have taken an interest in the legal integrity of the Olympics 2008 logo, which they own. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
InternetNews
February 12, 2010
AvMed Breach Exposes 200,000 Customers' Info Latest security breach hits Florida insurance provider AvMed Health Plan, with a missing pair of laptops putting more than 200,000 customers' information at risk. mark for My Articles similar articles
National Defense
January 2008
Stew Magnuson
DHS Pressing On With Troubled Technology Programs Whether it is program delays, public uproars over its policies, court challenges or accusations of mismanagement, nothing ever seems to go smoothly for DHS. Many of these controversial programs involve the development of new technologies. mark for My Articles similar articles
T.H.E. Journal
April 2005
Philip Lombardi
Asset-Tracking Technology Helps Lockdown, Recover Laptops at Bryant University To better prepare students for technology adaptation, Bryant University in Smithfield, R.I., has initiated a program that outfits all incoming freshmen with new IBM notebooks for personal and educational use. mark for My Articles similar articles
Chemistry World
July 24, 2008
Hepeng Jia
Chemists join Olympic clean-up effort Chemists have played a vital role in improving Beijing's air quality for the Olympics, guiding the government's massive clean-up operation by highlighting and monitoring major pollution sources. mark for My Articles similar articles
Chemistry World
June 13, 2008
Hepeng Jia
Olympic chemical restrictions worries industry The Chinese government's drive to restrict the movement and manufacture of chemicals ahead of the Beijing Olympics could hit the country's chemical industry, analysts have warned. mark for My Articles similar articles
Inc.
September 2004
Lora Kolodny
New Virus Goes After BlackBerries Look for the next generation of computer viruses to target mobile devices, from smart phones to PDAs. mark for My Articles similar articles
InternetNews
January 9, 2007
Ed Sutherland
Retiree Data Lost in Laptop Theft Laptops are stolen from Manhattan-based Towers Perrin offices. Retirees are being urged to monitor credit records. mark for My Articles similar articles