Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS

Professor Chuck Brooks appointed by Georgetown University’s Master in Applied Intelligence

Professor Chuck Brooks appointed by Georgetown University’s Master in Applied Intelligence

Tue, 2018-02-06 08:45 AM Chuck Brooks, MA ’81 was recently appointed to be Adjunct Faculty at Master’s in Applied Intelligence Program at Georgetown University. Georgetown University’s Master of Professional Studies…

Time until GDPR enforcement, as from today: 117 days.

Time until GDPR enforcement, as from today: 117 days.

by Victor Bjorgan, January 27th 2018.-   The General Data Protection Regulation (GDPR) was  approved by the EU Parliament on 14 April 2016. It entered in force 20 days after its publication in the EU…

Ransomware: how hackers take your computer hostage

Ransomware: how hackers take your computer hostage

Anti-Fraud Advisory David Clarke on rising fraud and cybercrime.

Anti-Fraud Advisory David Clarke on rising fraud and cybercrime.

Potential security threats during 2018

Potential security threats during 2018

This year , look after the following potential security threats and learn how to avoid them. Following, you´ll find the main security flaws and organizations ,  and other cyber threats:…

Handbook on Crisis Management & Communications during Terrorist Attack

Handbook on Crisis Management & Communications	during  Terrorist	Attack

Organizations that are affected either directly or indirectly during a Terrorist Attack must also respond – quickly and professionally, with proper Crisis Management and Crisis Communications. According to a survey…

Milipol 2017 : anti-terrorism at the heart of innovations.

Milipol 2017 : anti-terrorism at the heart of innovations.

By Victor R. Bjorgan, Paris, November 25th 2017.-  The fight against the threat of terrorism was at the heart of innovations during MILIPOL 2017. The 20th edition of the Milipol…

Hacking UK Trident, A Growing Threat

Hacking UK Trident, A Growing Threat

According to a report published by the London-based think tank British American Security Information Council (Basic), the UK Trident submarine fleet is vulnerable to cyber-attacks. According to the report “Hacking UK…

Director of GCHQ Jeremy Fleming: Cybersecurity as big a challenge as counterterrorism.

Director of GCHQ  Jeremy Fleming: Cybersecurity as big a challenge as counterterrorism.

Defending against cyberattacks is as big a challenge for the UK as protecting against terrorism, according to the director of GCHQ. “If GCHQ is to continue to help keep the country safe,…

Mobile´s can add value to Internet of Things IOT´s devices

Mobile´s can add value to Internet of Things IOT´s devices

The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we…

Page 1 of 13123Next ›Last »