If you use privacy tools, according to the apparent logic of the National Security Agency, it doesn’t much matter if you’re a foreigner or an American: Your communications are subject to an extra dose of surveillance.
Innovative IT Security Tools and Techniques at the Department of State
For those of you in the Federal IT community who are not engaged in the area of IT security as your primary pursuit, I thought you might be interested in hearing about some of the innovative tools and techniques that we employ at the Department of State to secure our worldwide wide network.This is the first of a series that will hopefully inform and enlighten the IT Federal community, resulting in an exchange of ideas.
Cyber Challenge: 10,000 security warriors wanted
Want CSI without the blood? Investigate computer forensics
Most people may not have any idea what a computer forensics expert does beyond a general knowledge gleaned from spy novels.
FORENSIC FILES: Clouds on the horizon
Rules of Evidence and how to
Searching for clues? Here's how to investigate and use digital forensics and e-discovery tools.
5 Musts For E-Discovery And Backup Tapes
Pull IT And Legal Teams Together--Now
E-discovery is a complex process that has intricate technological and legal requirements.