Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Privacy Rights

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

CIA in the Big Data era.

CIA in the Big Data era.

Last October 8th, the CIA launched its new and highly public profiled Directorate for Digital Innovation entering the Big Data era, in order to answer the very big question of how to…

Cloud computing is a risky business.

Cloud computing is a risky business.

Many people feel that Cloud computing has been around for quite a long time, and intrusion into such technology is far from innovative. To them, it appears that instead of storing…

NSA called for an Internet governed by the Law of the Sea.

NSA called for an Internet governed by the Law of the Sea.

The Chief of the U.S. National Security Agency Admiral Michael Rogers called on Wednesday for an “open, reliable and safe” Internet governed by international rules akin to the Law of…

IARPA´s searching new tech to collect information.

IARPA´s searching new tech to collect information.

As the House deliberates on measures to end the National Security Agency’s bulk data collection, intelligence community researchers are searching for new ways to collect more relevant information and less bulk.   Emerging tech agency the Intelligence…

Federal Appeals Court in NY ruled NSA´s phone records program as illegal.

Federal Appeals Court in NY ruled NSA´s phone records program as illegal.

WASHINGTON — A federal appeals court in New York ruled on Thursday that the once-secret National Security Agency program that is systematically collecting Americans’ phone records in bulk is illegal.…

To fight crime, more U.S. law enforcement agencies are using undercover agents.

To fight crime, more U.S. law enforcement agencies are using undercover agents.

The U.S. federal government has expanded the use of undercover operations in recent years, with officers from at least 40 federal agencies posing as  welfare recipients, business people, doctors, political…

Facial recognition replacing password.

Facial recognition replacing password.

You may soon be able to securely log on to your online accounts by just looking at your computer. “The password the way we know it today must die,” said…

E-mail providers adopting encryption.

E-mail providers adopting encryption.

Various e-mail providers are adopting encryption. Google said 65 percent of the messages sent by Gmail users are encrypted when delivered, meaning the recipient’s provider also supports the encryption needed…

Exponential 2014: Defense double spending on U.S. Cyber Command up to $ 1 trillion.

Exponential 2014: Defense double spending on U.S. Cyber Command up to $ 1 trillion.

    The $1 trillion omnibus appropriations bill for fiscal 2014 would more than double Defense Department spending on U.S. Cyber Command and would boost the Department of Homeland Security’s…

Page 1 of 41234