Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » Security Issues

About the lone wolf terrorist threat.

About the lone wolf terrorist threat.

President Donald Trump and his administration formulate their plans to combat terrorism, they will discover that dealing with the threat of lone wolf terrorism will prove to be the most…

U.S. Drug Crisis and Police-Community Unity.

U.S. Drug Crisis and Police-Community Unity.

According to the Centers for Disease Control and Prevention (CDC), the United States is in the midst of an opioid overdose epidemic. America’s drug pandemic demands a collaboration of our…

Traffic Enforcement´s MicroStrategy : The BI Advantage

Traffic Enforcement´s MicroStrategy : The BI Advantage

In the State of Oklahoma, law enforcement agencies are using data driven intelligence to reduce crime and improve traffic safety. If we can predict how, when, where, and why these collisions…

Community Policing: a Growing Trend.

Community Policing: a Growing Trend.

Public discourse on community policing hasn’t been so high since the mid-1990s, when a citizen filmed the mistreatment of Rodney King on the streets of Los Angeles. Following the relatively…

Modern cyber attacks

Modern cyber attacks

Sometimes, your data protection tools may actually be providing a false sense of security. A Venafi survey of 500 CIOs found that they were wasting millions of dollars on cyber security…

Intel Method for providing executives with safety, security and productivity.

Intel Method for providing executives with safety, security and productivity.

This article explains where things go after the OSINT investigation, and how remote intelligence, field intelligence and physical protection can work in conjunction and produce high-level security results for your…

How to bolster defense capabilities against unauthorized access

How to bolster defense capabilities against unauthorized access

If NSA, the top intelligence agency of the United States of America succumbed to illegitimate insider access and lost 1.7 million confidential and classified documents, it’s a red flag for…

Hacking research: attacks every 39 seconds.

Hacking research:  attacks  every 39 seconds.

A Clark School study at the University of Maryland is one of the first to quantify the near-constant rate of hacker attacks of computers with Internet access—every 39 seconds on…

Ohio adopts new standards governing the use of deadly force.

Ohio adopts new standards governing the use of deadly force.

Ohio’s two-year-old program to certify police departments in use-of-force and hiring training procedures is gaining followers. Read article here…

Cyber attack: What´s Clickjacking?

Cyber attack:  What´s Clickjacking?

  Clickjacking, also known as User Interface redress attack, is a malicious technique of tricking a Web user to click on something different from what the user perceives they are…

Page 1 of 74123Next ›Last »