Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Law Enforcement

Traffic Enforcement´s MicroStrategy : The BI Advantage

Traffic Enforcement´s MicroStrategy : The BI Advantage

In the State of Oklahoma, law enforcement agencies are using data driven intelligence to reduce crime and improve traffic safety. If we can predict how, when, where, and why these collisions…

All about the criminal rats behind Spora ransomware.

All about the criminal rats behind Spora ransomware.

Nowadays, ransomware has become the most dangerous type of criminal malware. Most of the new families are prepared by amateurs (script-kiddies) and they are distributed on a small scale. Inside…

Anti-money laundering & Banks: more cooperation and resources to intelligence and police.

Anti-money laundering & Banks: more cooperation and resources to intelligence and police.

Dan Marsden is the head of Web Development at Universal Media, and contributor at lawyer-monthly.com He interviewed Gert Demmink (Partner at Philip Sidney) on how  to Stop Money Laundering Funding…

The rise of digital organized crime and the cybercops.

The rise of digital organized crime and the cybercops.

While ransomware is a rising threat, it’s child’s play compared to what’s coming. We will see the rise of digital organized crime and the need for as many digital cops as…

Having a Cyber threat intelligence analyst is vital.

Having a Cyber threat intelligence analyst is vital.

Having a Cyber threat intelligence analyst working for you, makes sense for your business. Analyst expertise can span a wide range of business, technical and security-related areas and the outputs…

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

In April 2016, the U.S. Supreme Court approved the modified version of Rule 41 of the Federal Rules of Criminal Procedure. The amendments empower U.S. judges to issue search warrants…

ECaTS is the first universal 911

ECaTS is the first universal 911

ECaTS is an acronym for Emergency Call Tracking System. ECaTS is the first universal 911 Call Reporting System that leverages the ubiquitous nature of the Internet to provide secure, real-time…

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

Cloud computing is a risky business.

Cloud computing is a risky business.

Many people feel that Cloud computing has been around for quite a long time, and intrusion into such technology is far from innovative. To them, it appears that instead of storing…

IBM enabling Police agencies to access advanced crime analytics.

IBM enabling Police agencies to access advanced crime analytics.

IBM’s i2 Coplink police software is moving to the cloud, enabling agencies of any size to access advanced crime analytics capabilities. Coplink enables police officers in different states to consolidate…

Page 1 of 512345