Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    unusual trading activity
    Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
    3 Min Read
    software developer using ai
    How Data Analytics Helps Developers Deliver Better Tech Services
    8 Min Read
    ai for stock trading
    Can Data Analytics Help Investors Outperform Warren Buffett
    9 Min Read
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: CIA Releases Its Maps, DHS Secretary Doesn’t Use Email, and More
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > CIA Releases Its Maps, DHS Secretary Doesn’t Use Email, and More
Security

CIA Releases Its Maps, DHS Secretary Doesn’t Use Email, and More

AlexOlesker
AlexOlesker
3 Min Read
SHARE

By AlexOlesker

Here is today’s federal cybersecurity and information technology news:

By AlexOlesker

Here is today’s federal cybersecurity and information technology news:

More Read

4 Ways to Increase the Security of Wearable Devices
Big Data, Small Details: How Metadata Creates Security Risks
AI Creates A New Generation Of VPN Passthrough Tools
Special Summary: Enterprise security stories
Mobile Security Critical for BI
  • Homeland Security Secretary Janet Napolitano admitted to avoiding most online services including email, commenting that “Some would call me a Luddite.” More here.
  • Of 27 government agencies reviewed by the Government Accountability Office, only 11 had fully or partially established metrics for assessing their enterprise architectures and only five have fully or partially measured outcomes and benefits. More here.
  • Nakoula Basseley Nakoula, the film maker behind the controversial “Innocence of Muslims” which sparked worldwide protest, has been jailed for violating his probation for past fraud charges by using a computer. More here.
  • University of Illinois professor Sheldon Jacobson and American University professor Allan Lichtman used separate Big Data analytics platforms to predict that Obama would win the 2012 election. More here.
  • The Central Intelligence Agency has publicly released its collection of online maps of 75 countries and world regions with information on world political leaders. More here.
  • Department of Justice use of pen register and trap-and-trace warrantless internet and telephone surveillance methods has increased by 600% over the last decade. More here.’
  • Despite concerns over electronics supply chain vulnerabilities, the Department of Defense refuses to adopt rigid supply chain countermeasures. More here.
  • The National Science Foundation has awarded $50 million to over 70 research projects focused on cybersecurity. More here.
  • Government agencies and utilities are being targeted in a campaign of “waterhole” attacks where infected websites redirect visitors to malicious servers. More here.
  • In-Q-Tel, the Central Intelligence Agency venture capital wing, is funding technology to provide vulnerability scanning and monitoring tools for intelligence and defense networks. More here.
  •  Sean Kanuck, national intelligence officer for the National Intelligence Council, called on the private sector to share more cyber attack information with federal agencies. More here.
  • Rear Admiral Samuel Cox, the director of intelligence for Cyber Command, echoed accusations that China is targeting the Department of Defense with cyber attacks and cyber espionage. More here.

 

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

fda14abd c869 4da5 943c c036ad8efc2e
How Data-Driven Journalists Are Using API News Apps to Improve Reporting
Big Data Exclusive News
0622cae5 f7d7 4f74 84b5 eabd1a823dca
How Data-Driven Grocery Recommendations Help Shoppers Eat Better With Less Effort
Big Data Exclusive
business recovering from data loss
How Data-Driven Businesses Protect MySQL Databases from Shutdown
Big Data Exclusive
ai driven task management
Reducing “Work About Work” with AI Task Managers
Artificial Intelligence Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Safeguarding Patient Data in EHRs

5 Min Read
ai and cybersecurity
Security

Advances in AI Are Driving Major Changes in Cybersecurity

7 Min Read

The IT-ization of Consumers

5 Min Read
data breach and protection
Big DataITSecurity

Terrifying Big Data Report Shows Anyone Can Get Your Info for $2

8 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?