Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: CIA Releases Its Maps, DHS Secretary Doesn’t Use Email, and More
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > CIA Releases Its Maps, DHS Secretary Doesn’t Use Email, and More
Security

CIA Releases Its Maps, DHS Secretary Doesn’t Use Email, and More

AlexOlesker
AlexOlesker
3 Min Read
SHARE

By AlexOlesker

Here is today’s federal cybersecurity and information technology news:

By AlexOlesker

Here is today’s federal cybersecurity and information technology news:

More Read

Ransomware attack
Locky Ransomware Statistics: Geos Targeted, Amounts Paid, Spread Volumes and Much More…
New Report Reveals Portable External Hard Drive Led to Data Loss
Software Bill of Materials is Crucial for AI-Driven Cybersecurity
The Importance of Maintaining Consistency in Your Small Business’s Cybersecurity Protocols
Delivering Security And Operational Efficiency In Multi-Cloud Environments
  • Homeland Security Secretary Janet Napolitano admitted to avoiding most online services including email, commenting that “Some would call me a Luddite.” More here.
  • Of 27 government agencies reviewed by the Government Accountability Office, only 11 had fully or partially established metrics for assessing their enterprise architectures and only five have fully or partially measured outcomes and benefits. More here.
  • Nakoula Basseley Nakoula, the film maker behind the controversial “Innocence of Muslims” which sparked worldwide protest, has been jailed for violating his probation for past fraud charges by using a computer. More here.
  • University of Illinois professor Sheldon Jacobson and American University professor Allan Lichtman used separate Big Data analytics platforms to predict that Obama would win the 2012 election. More here.
  • The Central Intelligence Agency has publicly released its collection of online maps of 75 countries and world regions with information on world political leaders. More here.
  • Department of Justice use of pen register and trap-and-trace warrantless internet and telephone surveillance methods has increased by 600% over the last decade. More here.’
  • Despite concerns over electronics supply chain vulnerabilities, the Department of Defense refuses to adopt rigid supply chain countermeasures. More here.
  • The National Science Foundation has awarded $50 million to over 70 research projects focused on cybersecurity. More here.
  • Government agencies and utilities are being targeted in a campaign of “waterhole” attacks where infected websites redirect visitors to malicious servers. More here.
  • In-Q-Tel, the Central Intelligence Agency venture capital wing, is funding technology to provide vulnerability scanning and monitoring tools for intelligence and defense networks. More here.
  •  Sean Kanuck, national intelligence officer for the National Intelligence Council, called on the private sector to share more cyber attack information with federal agencies. More here.
  • Rear Admiral Samuel Cox, the director of intelligence for Cyber Command, echoed accusations that China is targeting the Department of Defense with cyber attacks and cyber espionage. More here.

 

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data science professor
The Power of Warm-Ups: Setting the Stage for Learning
Exclusive News
cloud dataops for metering
Taming the IoT Firehose: How Utilities Are Scaling Cloud DataOps for Smart Metering
Cloud Computing Exclusive Internet of Things IT
ai in video game development
Machine Learning Is Changing iGaming Software Development
Exclusive Machine Learning News
media monitoring
Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
Analytics Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Image
Best PracticesBig DataSecurity

If You Think Data Security is IT’s Responsibility, Think Again

5 Min Read
what cyber criminals can do with your metadata
Best PracticesBig DataData ManagementExclusivePrivacyRisk ManagementSecurity

What Cyber Criminals Can Do With Your Metadata

8 Min Read
ai helps improve SAST
Artificial Intelligence

AI-Driven SAST Strategies Transform Application Security

10 Min Read
cybersecurity risk and threats
Security

Digital Transformation: How To Protect Your Organization From Cyber Risk

14 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?