Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Text Mining

70 % of Internet traffic worldwide travels through Northern Virginia.

70 % of Internet traffic worldwide travels through Northern Virginia.

Once in a while—not quite often enough to be a crisis, but just often enough to be a trope—people in the United States will freak out because a huge number…

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

CIA in the Big Data era.

CIA in the Big Data era.

Last October 8th, the CIA launched its new and highly public profiled Directorate for Digital Innovation entering the Big Data era, in order to answer the very big question of how to…

Washington DC: hub for cyber security technology companies.

Washington DC: hub for cyber security technology companies.

Many U.S. companies  wants to buy  software that fortifies their networks and fends off hackers from cyber-attacks like those that afflicted  big-name businesses, including Target, JPMorgan Chase, Home Depot, Citigroup and…

World Cup Brazil 2014: what to do to avoid hackers.

World Cup Brazil 2014: what to do to avoid hackers.

When the 2014 World Cup kicks of in Brazil this week, the event is expected to draw hundreds of thousands of diehard soccer fans from around the world. Since those fans are…

Facial recognition replacing password.

Facial recognition replacing password.

You may soon be able to securely log on to your online accounts by just looking at your computer. “The password the way we know it today must die,” said…

Exponential 2014: Defense double spending on U.S. Cyber Command up to $ 1 trillion.

Exponential 2014: Defense double spending on U.S. Cyber Command up to $ 1 trillion.

    The $1 trillion omnibus appropriations bill for fiscal 2014 would more than double Defense Department spending on U.S. Cyber Command and would boost the Department of Homeland Security’s…

Obama to explain changes to NSA surveillance programs on January 17th.

Obama to explain changes to NSA surveillance programs on January 17th.

President Obama will detail proposed changes to government surveillance programs in a speech next Friday, the White House confirmed. White House press secretary Jay Carney said Mr. Obama will outline…

NSA´s program is lawful says U.S. Federal Judge and dismissed claim from American Civil Liberties Union.

NSA´s program is lawful says U.S. Federal Judge and dismissed claim from American Civil Liberties Union.

A prestigious federal judge ruled on Friday that the National Security Agency’s bulk collection of millions of Americans’ telephone and Internet records is lawful and a critical component of the…

SIGINT victory: NSA and GCHQ unlock online encryption from big internet companies.

SIGINT victory: NSA and GCHQ unlock online encryption from big internet companies.

The intelligence agencies NSA (U.S.) and GCHQ (U.K.) were able to monitor “large amounts” of data (from Hotmail, Google, Yahoo and Facebook) flowing through the world’s fibre-optic cables and break…

Page 1 of 3123