Similar Articles |
|
CIO October 29, 2014 Dunst & Brook |
Confidential Business Data at Risk at the Border U.S. agents can search and seize the laptops of international travelers at the border, so take precautions to protect confidential business information |
InternetNews September 18, 2009 |
Do You Need to Fear Being Hacked From China? The U.S. government says China is capable of stealing your secrets - and may successfully do so, unless you take precautions. |
InternetNews September 22, 2006 Roy Mark |
Where Have All The Laptops Gone? The Department of Commerce reports more than 1,000 computers are lost, stolen or missing. |
National Defense August 2013 Jeffrey G. Richardson |
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. |
InternetNews April 7, 2008 |
China Allows Access to English Wikipedia As Olympics near, Chinese authorities ease 'Net restrictions on online encyclopedia. |
CFO October 1, 2007 Wu Chen |
View from China: What Price Glory? The Beijing Summer Olympics will undoubtedly be a success -- but at what cost? |
InternetNews February 4, 2009 Richard Adhikari |
Napolitano Urged to Act on Border Laptop Seizures Homeland security advisers press for greater oversight by privacy officials. |
Insurance & Technology May 18, 2004 Paul McDougall |
Laptop Theft Compromises Data GMAC Financial Services customers have personal data stolen. |
InternetNews December 28, 2007 Mike Elgan |
Here Comes The 2008 Beijing Olympic Disaster A half-million visitors will upload everything they see to YouTube, LiveLeak and Flickr. What happens when the "Great Firewall of China" is breached? |
InternetNews June 22, 2006 Clint Boulton |
Two FTC Laptops Stolen The Federal Trade Commission today said two if its attorneys' laptops containing the personal information of 110 people were stolen from a locked vehicle last week. |
InternetNews October 3, 2008 Richard Adhikari |
Arbitrary Seizure of Travelers' Laptops Ending? Fourth Amendment rights could be restored at the border. |
Entrepreneur August 2007 Amanda C. Kooser |
Safe Trip Encrypt, secure, and back-up! Prevention is the key when it comes to the security of your small business data and hardware while traveling. |
InternetNews September 25, 2009 |
DHS Privacy Report Downplays Laptop Searches The Department of Homeland Security brushes off criticism from civil liberties groups in 99-page report to Congress. |
Wall Street & Technology May 31, 2007 Elena Malykhina |
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. |
InternetNews February 13, 2007 Ed Sutherland |
FBI Laptops Make Most Wanted List Audit reports lost and stolen FBI laptops included computers in anti-terror and counter-spy programs. |
InternetNews April 5, 2007 Roy Mark |
IRS Audits Self Into Data-Theft Hot Seat New audit finds IRS with 500 missing or stolen laptops, some with unencrypted taxpayer confidential information. |
Wired October 23, 2007 Oliver August |
The Great Firewall: China's Misguided -- and Futile -- Attempt to Control What Happens Online The Chinese government's ability to monitor and control electronic communication is impressive and a little frightening. |
InternetNews November 24, 2009 |
Many Enterprises Clueless on Mobile Data: Study Survey finds that two in three European companies have no clue what and how much corporate data is housed on employees' mobile devices. |
National Defense July 2006 Harold Kennedy |
Biometric Check on U.S. Visitors Drawing Criticism A controversial effort by the Department of Homeland security to create a biometric computer system to keep tabs on all foreigners entering and leaving the country is drawing increasing flak at home and abroad. |
Investment Advisor March 1, 2011 Lewis Schiff |
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. |
Inc. August 2008 Michael Fitzgerald |
Help! Somebody Save Our Files! How to handle and prevent the most common data disasters. |
National Defense September 2011 Eric Beidel |
Homeland Security Market 'Vibrant' Despite Budget Concerns The abundance of small, medium and large firms vying for DHS contracts is creating healthy competition. |
National Defense March 2005 Joe Pappalardo |
U.S.-Canadian Border Crossings to Tighten Security The bridges and border control stations on the U.S.-Canada border are undergoing strategic overhauls, not only to increase security but also to ensure rapid throughput of commercial traffic, leaders from both nations recently announced. |
National Defense April 2005 Joe Pappalardo |
Homeland Security The U.S. Department of Homeland Security proposed a 2006 budget that includes increased spending on technology. |
InternetNews June 1, 2004 Roy Mark |
Accenture Lands Potential $10B Federal Contract Company to employ biometrics as part of Department of Homeland Defense's virtual border program. |
Reason February 2008 Kerry Howley |
Artifact: The Counterfeit Olympics Beijing authorities have taken an interest in the legal integrity of the Olympics 2008 logo, which they own. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
InternetNews February 12, 2010 |
AvMed Breach Exposes 200,000 Customers' Info Latest security breach hits Florida insurance provider AvMed Health Plan, with a missing pair of laptops putting more than 200,000 customers' information at risk. |
National Defense January 2008 Stew Magnuson |
DHS Pressing On With Troubled Technology Programs Whether it is program delays, public uproars over its policies, court challenges or accusations of mismanagement, nothing ever seems to go smoothly for DHS. Many of these controversial programs involve the development of new technologies. |
T.H.E. Journal April 2005 Philip Lombardi |
Asset-Tracking Technology Helps Lockdown, Recover Laptops at Bryant University To better prepare students for technology adaptation, Bryant University in Smithfield, R.I., has initiated a program that outfits all incoming freshmen with new IBM notebooks for personal and educational use. |
Chemistry World July 24, 2008 Hepeng Jia |
Chemists join Olympic clean-up effort Chemists have played a vital role in improving Beijing's air quality for the Olympics, guiding the government's massive clean-up operation by highlighting and monitoring major pollution sources. |
Chemistry World June 13, 2008 Hepeng Jia |
Olympic chemical restrictions worries industry The Chinese government's drive to restrict the movement and manufacture of chemicals ahead of the Beijing Olympics could hit the country's chemical industry, analysts have warned. |
Inc. September 2004 Lora Kolodny |
New Virus Goes After BlackBerries Look for the next generation of computer viruses to target mobile devices, from smart phones to PDAs. |
InternetNews January 9, 2007 Ed Sutherland |
Retiree Data Lost in Laptop Theft Laptops are stolen from Manhattan-based Towers Perrin offices. Retirees are being urged to monitor credit records. |