Security’s Security

data security best practices

Article Excerpt

There may be no better symbol of the nation’s modern, high-tech military—not to mention US military might—as its fleet of predator drones. So it surely caused a few red faces at the Pentagon when it was discovered that insurgents in both Afghanistan and Iraq had used $26 software to intercept…

—End of excerpt—


Comments

Leave a Reply

Enter Your Log In Credentials
This setting should only be used on your home or work computer.

×

Send this to friend