Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS

Law Enforcement and Social Media

Law Enforcement and Social Media

Whether your agency is still exploring how to do social media, or perhaps it already has some social media pages (but could be doing better), social media is quickly becoming…

The rise of digital organized crime and the cybercops.

The rise of digital organized crime and the cybercops.

While ransomware is a rising threat, it’s child’s play compared to what’s coming. We will see the rise of digital organized crime and the need for as many digital cops as…

Five things to do if you get hacked.

Five things to do if  you get hacked.

Recent studies all seem to agree on one point – that a cyberattack is a near certainly for every organization. Some organizations may be victimized more than once. Here are…

Futuristic crime scene technology is here now.

Futuristic crime scene technology is here now.

When a homemade pressure-cooker bomb exploded in a dumpster in the Chelsea section of Manhattan in mid-September, police officers, FBI agents, and bomb techs isolated the crime scene, interviewed witnesses,…

Russia back in the USSR?

Russia back in the USSR?

It seems Mr. Snowden´s help is not enough. Russia is considering plans to restore military bases in Vietnam and Cuba that had served as pivots of Soviet global military power…

Cybersecurity vulnerability of U.S. elections

Cybersecurity vulnerability of U.S. elections

This is the first of a four-part series, based on interviews with private sector cybersecurity experts, on the vulnerability of U.S. elections to cyberspace intrusion. The next three parts will…

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

According to  CIA´s Deputy Director for Digital Innovation Andrew Hallman, the Agency has significantly improved its “anticipatory intelligence,” using a mesh of sophisticated algorithms and analytics against complex systems to better…

Having a Cyber threat intelligence analyst is vital.

Having a Cyber threat intelligence analyst is vital.

Having a Cyber threat intelligence analyst working for you, makes sense for your business. Analyst expertise can span a wide range of business, technical and security-related areas and the outputs…

The best cyber security tools of 2016

The best cyber security tools of 2016

The best cyber security tools of 2016 have been listed here for you. These cyber security tools are a must have, and it is wise to have some experience with…

A malicious version of Pokémon GO is poised to infect Android phones with malware code.

A malicious version of Pokémon GO is poised to infect Android phones with malware code.

Compromised versions of the mobile game were found on 3rd-party sites. Nintendo’s new Pokémon GO augmented reality game has quickly proven to be a cultural phenomenon, juicing the company´s stock.…

Page 1 of 19123Next ›Last »