Disrupting the status quo: Data-driven analysis of terrorism

Disrupting the status quo: Data-driven analysis of terrorism

Disrupting the status quo: Data-driven analysis of terrorism | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Artificial intelligence’s role in the pandemic

Artificial intelligence’s role in the pandemic

Artificial intelligence’s role in the pandemic | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Innovation in the security industry: Searching for the unicorn

Innovation in the security industry: Searching for the unicorn

Innovation in the security industry: Searching for the unicorn | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Clearing Up Elements of Cloud Security | The State of Security

Clearing Up Elements of Cloud Security | The State of Security

In this episode, Tripwire’s Brent Holder and Raymond Kirk discuss what cloud security means today. Breaking down the different aspects of cloud security controls, they cover the technology, security implications and risks with cloud use. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 Tim Erlin: On the latest episode of the Tripwire Cybersecurity Podcast, I had the pleasure of speaking with Raymond Kirk, and Brent Holder. Raymond and Brent are both distinguished members of the Tripwire team. The…

Read More

Where Should We Draw the Cyber Blue Line? | The State of Security

Where Should We Draw the Cyber Blue Line? | The State of Security

What are the limits of online privacy and law enforcement? Can we clearly define them, or is this a vague and blurred area of debate? The fact is that as technology advances, the real and the virtual worlds are increasingly converging. Actions (or inactions) in the cyberspace introduce risks and threats for people, especially the most vulnerable ones, i.e. children and elders. Criminals have moved their operations in the cyber realm, becoming more sophisticated and…

Read More

Mustang Panda Compromises Indonesian Intelligence Agency

Mustang Panda Compromises Indonesian Intelligence Agency

A China-based cyber-espionage threat actor has reportedly compromised the internal networks of at least ten Indonesian government ministries and agencies. The intrusion – believed to be the work of Mustang Panda – was first reported by The Record and is thought to have impacted the Badan Intelijen Negara (BIN), Indonesia’s main intelligence service. The cyber-espionage campaign was uncovered in April 2021 by Insikt Group, a division of Recorded Future that is dedicated to researching threats.  Insikt researchers raised the…

Read More

US Locks Up Key Player in Nigerian Romance Scam

US Locks Up Key Player in Nigerian Romance Scam

An Oklahoma man has been sent to prison for his role in an online romance scam that defrauded victims across the United States out of at least $2.5m.  Norman resident Afeez Olajide Adebara was handed a custodial sentence on Friday after pleading guilty on November 3, 2020, to conspiracy to commit money laundering.  According to court documents, 36-year-old Adebara acted as the manager of a group of money launderers involved in the scam.  Between 2017 and November…

Read More

How to utilize openssl in Linux to check SSL certificate details

How to utilize openssl in Linux to check SSL certificate details

SSL certificates are an integral component in securing data and connectivity to other systems. Learn tips on how you can use the Linux openssl command to find critical certificate details. Image: Getty Images/iStockphoto Administering SSL certificates can be quite a chore, especially when it comes time to renew or replace them. Expiring SSL certificates can be devastating for technological operations, with the impact ranging from worrisome browser error messages to complete production outages. Therefore, it’s…

Read More

CISA Announces New Chief of Staff

CISA Announces New Chief of Staff

The United States Cybersecurity and Infrastructure Security Agency (CISA) has appointed Kiersten Todt as its new chief of staff.  In her new role, cybersecurity veteran Todt will be tasked with allocating resources, planning, and supporting CISA’s goals through the creation of long-term objectives.  CISA director Jen Easterly, in an announcement earlier today, described Todt as “extraordinarily well-qualified for this critical role.” Easterly added: “I am particularly excited to be able to draw upon Kiersten’s leadership ability and…

Read More

Offense Activities Sharing in Criminal Justice Case

Offense Activities Sharing in Criminal Justice Case

By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need to be deeply explored and investigated by the case management team and the other officers. The offense activities are not only limited to the crime scene and they can get delivered, shared and transferred domestically, regionally or in the transnational manner. In this effort, we would analyze the common criminal justice scheme being the theft that can…

Read More
1 2,244 2,245 2,246 2,247 2,248 2,739