MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
May 2010
Dunderdale & Tyliszczak
Is It Possible to Both Share and Protect Sensitive Data? The Defense Department must be able to communicate critical intelligence across agencies and geographic boundaries quickly and securely. mark for My Articles similar articles
CFO
December 1, 2007
Lori Calabro
Homeland Security's Tom Ridge The first secretary of Homeland Security talks about what companies should fear most. mark for My Articles similar articles
National Defense
December 2012
Dan Parsons
Benghazi Attack Puts Spotlight on Marine Embassy Guards When the U.S. consulate in Benghazi, Libya, was overrun on Sept. 11, public outcry erupted over whether security at the installation was sufficient. mark for My Articles similar articles
Parameters
Autumn 2008
Travis Sharp
Tying US Defense Spending to GDP: Bad Logic, Bad Policy Defense spending should be determined according to threat-based analysis and not fixed at 4 percent of the gross domestic product (GDP). mark for My Articles similar articles
National Defense
November 2010
Stew Magnuson
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. mark for My Articles similar articles