Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS

Cyber Intelligence Supports Executive Protection.

Cyber Intelligence Supports Executive Protection.

Cyber threat intelligence can undoubtedly be integral to bolstering an organization’s physical security. Deep and Dark Web Intelligence Supports Executive Protection. Read article here…

Traffic Enforcement´s MicroStrategy : The BI Advantage

Traffic Enforcement´s MicroStrategy : The BI Advantage

In the State of Oklahoma, law enforcement agencies are using data driven intelligence to reduce crime and improve traffic safety. If we can predict how, when, where, and why these collisions…

Vulnerability Assessment: how to get Management Support for Crisis Planning

Vulnerability Assessment: how to get Management Support for Crisis Planning

Two-thirds of all crises are the smoldering kind that are both predictable and preventable. Yet, it’s virtually impossible to prepare effectively for potential crises if you don’t know where and…

Modern cyber attacks

Modern cyber attacks

Sometimes, your data protection tools may actually be providing a false sense of security. A Venafi survey of 500 CIOs found that they were wasting millions of dollars on cyber security…

Intel Method for providing executives with safety, security and productivity.

Intel Method for providing executives with safety, security and productivity.

This article explains where things go after the OSINT investigation, and how remote intelligence, field intelligence and physical protection can work in conjunction and produce high-level security results for your…

How to bolster defense capabilities against unauthorized access

How to bolster defense capabilities against unauthorized access

If NSA, the top intelligence agency of the United States of America succumbed to illegitimate insider access and lost 1.7 million confidential and classified documents, it’s a red flag for…

The cyber attack lifecycle

The cyber attack lifecycle

The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While important, many of today’s advanced and motivated threat actors are circumventing perimeter based…

New Money Laundering modus operandi: Transaction Laundering.

New Money Laundering modus operandi: Transaction Laundering.

Transaction laundering is the new sophisticated form of money laundering and terrorism financing  and is one of the biggest challenges facing the AML regime today. This advanced merchant-based fraud scheme…

About Microsoft Anti Cybercrime capabilities

About Microsoft Anti Cybercrime capabilities

          Microsoft update Windows a billion times a month.  A billion devices are upgraded each month for security patches, for compatibility, to make sure that that…

Hacking research: attacks every 39 seconds.

Hacking research:  attacks  every 39 seconds.

A Clark School study at the University of Maryland is one of the first to quantify the near-constant rate of hacker attacks of computers with Internet access—every 39 seconds on…

Page 1 of 21123Next ›Last »