Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Information Technologies

Cyber Intelligence Supports Executive Protection.

Cyber Intelligence Supports Executive Protection.

Cyber threat intelligence can undoubtedly be integral to bolstering an organization’s physical security. Deep and Dark Web Intelligence Supports Executive Protection. Read article here…

Traffic Enforcement´s MicroStrategy : The BI Advantage

Traffic Enforcement´s MicroStrategy : The BI Advantage

In the State of Oklahoma, law enforcement agencies are using data driven intelligence to reduce crime and improve traffic safety. If we can predict how, when, where, and why these collisions…

The cloud doesn’t have to be a scary place.

The cloud doesn’t have to be a scary place.

With the right controls in place, the cloud doesn’t have to be a scary place. These guidelines can help your company stay safe. There are so many different kinds of…

All about the criminal rats behind Spora ransomware.

All about the criminal rats behind Spora ransomware.

Nowadays, ransomware has become the most dangerous type of criminal malware. Most of the new families are prepared by amateurs (script-kiddies) and they are distributed on a small scale. Inside…

Russia back in the USSR?

Russia back in the USSR?

It seems Mr. Snowden´s help is not enough. Russia is considering plans to restore military bases in Vietnam and Cuba that had served as pivots of Soviet global military power…

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

According to  CIA´s Deputy Director for Digital Innovation Andrew Hallman, the Agency has significantly improved its “anticipatory intelligence,” using a mesh of sophisticated algorithms and analytics against complex systems to better…

Having a Cyber threat intelligence analyst is vital.

Having a Cyber threat intelligence analyst is vital.

Having a Cyber threat intelligence analyst working for you, makes sense for your business. Analyst expertise can span a wide range of business, technical and security-related areas and the outputs…

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

In April 2016, the U.S. Supreme Court approved the modified version of Rule 41 of the Federal Rules of Criminal Procedure. The amendments empower U.S. judges to issue search warrants…

Five cybersecurity resources that spooks relies on.

Five cybersecurity resources that spooks relies on.

Bob Flores, former CTO with the Central Intelligence Agency (CIA) in the US, and now managing partner for Cognito Corp, has shared some key insights around data security in Australian…

Businesses competitive advantage is having successful cyber security actions.

Businesses competitive advantage is having successful cyber security actions.

In an environment where companies have to compete on a global scale, is important having an experienced staff to address technology security concerns and be able to act proactively to emerging…

Page 1 of 10123Next ›Last »