Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Open Source Intelligence

Intel Method for providing executives with safety, security and productivity.

Intel Method for providing executives with safety, security and productivity.

This article explains where things go after the OSINT investigation, and how remote intelligence, field intelligence and physical protection can work in conjunction and produce high-level security results for your…

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

According to  CIA´s Deputy Director for Digital Innovation Andrew Hallman, the Agency has significantly improved its “anticipatory intelligence,” using a mesh of sophisticated algorithms and analytics against complex systems to better…

New Gartner report on CASB evaluation criteria.

New Gartner report on CASB evaluation criteria.

As cloud adoption expands in the enterprise, IT leaders are finding that the visibility and control capabilities that help them secure data in cloud services vary widely from cloud service…

70 % of Internet traffic worldwide travels through Northern Virginia.

70 % of Internet traffic worldwide travels through Northern Virginia.

Once in a while—not quite often enough to be a crisis, but just often enough to be a trope—people in the United States will freak out because a huge number…

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

IBM enabling Police agencies to access advanced crime analytics.

IBM enabling Police agencies to access advanced crime analytics.

IBM’s i2 Coplink police software is moving to the cloud, enabling agencies of any size to access advanced crime analytics capabilities. Coplink enables police officers in different states to consolidate…

New statistical model predict violence and potential areas of conflict in Liberia.

New statistical model predict violence and potential areas of conflict in Liberia.

Computers have long been used to identify potential areas of conflict, but a new model being used in Liberia means that violence can now be predicted on a grassroots level.…

Exponential 2014: Defense double spending on U.S. Cyber Command up to $ 1 trillion.

Exponential 2014: Defense double spending on U.S. Cyber Command up to $ 1 trillion.

    The $1 trillion omnibus appropriations bill for fiscal 2014 would more than double Defense Department spending on U.S. Cyber Command and would boost the Department of Homeland Security’s…

NSA´s program is lawful says U.S. Federal Judge and dismissed claim from American Civil Liberties Union.

NSA´s program is lawful says U.S. Federal Judge and dismissed claim from American Civil Liberties Union.

A prestigious federal judge ruled on Friday that the National Security Agency’s bulk collection of millions of Americans’ telephone and Internet records is lawful and a critical component of the…

How to secure a high profile meeting.

How to secure a high profile meeting.

Maintaining security and privacy for high profile meetings is vital whether it is a shareholder meeting, political fundraiser or internal executive meeting. When off-the-cuff comments made by Mitt Romney at…

Page 1 of 212