Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Information Technologies

Russia back in the USSR?

Russia back in the USSR?

It seems Mr. Snowden´s help is not enough. Russia is considering plans to restore military bases in Vietnam and Cuba that had served as pivots of Soviet global military power…

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

According to  CIA´s Deputy Director for Digital Innovation Andrew Hallman, the Agency has significantly improved its “anticipatory intelligence,” using a mesh of sophisticated algorithms and analytics against complex systems to better…

Having a Cyber threat intelligence analyst is vital.

Having a Cyber threat intelligence analyst is vital.

Having a Cyber threat intelligence analyst working for you, makes sense for your business. Analyst expertise can span a wide range of business, technical and security-related areas and the outputs…

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

In April 2016, the U.S. Supreme Court approved the modified version of Rule 41 of the Federal Rules of Criminal Procedure. The amendments empower U.S. judges to issue search warrants…

Five cybersecurity resources that spooks relies on.

Five cybersecurity resources that spooks relies on.

Bob Flores, former CTO with the Central Intelligence Agency (CIA) in the US, and now managing partner for Cognito Corp, has shared some key insights around data security in Australian…

Businesses competitive advantage is having successful cyber security actions.

Businesses competitive advantage is having successful cyber security actions.

In an environment where companies have to compete on a global scale, is important having an experienced staff to address technology security concerns and be able to act proactively to emerging…

World Cyber Security Market up to $170 billion by 2020.

World Cyber Security Market  up to $170 billion by 2020.

The Wall Street Journal Venture Capital Dispatch is the latest to cite research from Gartner, Inc. which reports the world-wide cybersecurity market topped $75 billion in 2015. “Interest in security…

New Cloud security tools.

New Cloud security tools.

In the case of cloud computing, companies are realizing that trying to force fit the old security measures  into the new isn’t working; this leaves holes in visibility and protection,…

Interview w/former NSA Director, General Keith Alexander, on cyber terrorism and his IronNet

Interview w/former NSA Director, General Keith Alexander, on cyber terrorism  and his IronNet

Former NSA Director General Keith Alexander engage here in a wide-ranging discussion on these topics, covering terrorism, cyber threats, and network security. After leading the National Security Agency (NSA) for…

High-tech surveillance systems increasing to the stratosphere.

High-tech surveillance systems increasing to the stratosphere.

Times are getting tougher for criminals, thanks to technological advancements in public safety. Public spaces today are protected by high-tech surveillance systems, ranging from security cameras to gunshot detectors that…

Page 1 of 9123Next ›Last »