The Latest in IT Security

Posts Tagged ‘Methods’

James Comey, who heads up the Federal Bureau of Investigation (FBI), recently made an interesting remark during his presentation about encryption and technology at a college in Ohio, US. He admitted that, in order to protect his privacy, he puts tape over his laptop’s camera. The FBI director’s revelation created a buzz among information security […]

Read more ...

 FOR YEARS THE government has kept mum about its use of a powerful phone surveillance technology known as a stingray. The justice department and local law enforcement agencies insist that the only reason for their secrecy is to prevent suspects from learning how the devices work and devising methods to thwart them. But a court […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments