blog trackingRealtime Web Statistics Focus Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Focus’

Miami Port Security Operations Conference & Expo to focus on topics including business continuity, technology management

John Wagley Top Priority Sector:  maritime_port_security The Port Security Operations Conference & Expo 2014 will include a wide range of speakers from the public and private sectors, covering numerous security topics. Read More….

View full post on The Cyber Wars

ASIS New York City Security Conference and Expo to focus on topics including terrorism, active shooters

John Wagley Top Priority Sector:  law_enforcement_first_responders One of the highlights of the upcoming

View full post on The Cyber Wars

Security hackers got you scared? Focus on fundamentals, not hype

  You see them all over the news – reports of high-profile data breaches and computer attacks. This is a result of increased dependence on computers and increasing sophistication of the threats. Organizations and individuals who rely on computers, whether they sit in the boardroom or the family room, are wondering how they can protect against attacks, both […]

View full post on Gregory d. evans

House subcommittee to focus on DHS procurement practices

Top Priority Sector:  access_control_identification Image Caption:  Rep. Jeff Duncan Read More….

View full post on The Cyber Wars

Next TSA focus group on Nov. 6 will look at agency’s contracting and acquisition policies

Jacob Goodwin Top Priority Sector:  federal_agencies_legislative TSA and the Washington Homeland Security Roundtable, a non-profit group founded in 2003, are collaborating on a series of focus groups, the next of which will examine the agency’s contracting and acquisition policies, and will be held at TSA headquarters in Arlington, VA, on November 6 (which happens to […]

View full post on The Cyber Wars

Forensic Focus site redesign

A short advance warning that I’m planning to make some changes to the site design this evening. There won’t be any major changes, just a refresh to give what I hope will be a cleaner, more professional look with somewhat less clutter than we have at the moment.

As a result of the above, expect the site to be offline for a few hours starting at around 7PM GMT (I’ll try and keep downtime to a minimum).



View full post on Forensic Focus Blog

View full post on National Cyber Security

InfosecIsland: A Field Guide to Post-UDID Unique IDs on iOS – Ongoing developments in the device-wide ID space focus on two dueling…

InfosecIsland: A Field Guide to Post-UDID Unique IDs on iOS – Ongoing developments in the device-wide ID space focus on two dueling…
View full post on Twitter / InfosecIsland

View full post on National Cyber Security

Symantec conference puts focus on mobile security

At its annual Symantec Vision conference attended by enterprise customers and business partners, Symantec laid out its management and security product strategy for mobile endpoint devices, including the iPhone, iPad and Google Android devices.
View full post on Computerworld Security News

View full post on National Cyber Security » Announcements

SANS warns IT groups fail to focus on logs for security clues

Relatively few organisations are making good use of gobs of log data they collect for purposes such as identifying attackers, according to a survey of 600-plus IT professionals by security outfit SANS.

View full post on …

View full post on National Cyber Security » Computer Hacking

Greater Taunton police departments increase focus on cyber crime

As more criminals take to the Internet to search for victims, local police departments are being asked to do more in the world of cyber crime.

Easton police recently arrested a man for allegedly running an online real estate scam.

“This is the first of this type of crime that I’m aware of that we’ve handled,” Easton Police Chief Allen Krajcik said. “But we are definitely seeing more of it.”

Easton is part of a law enforcement consortium called METRO-LEC, but much of the work on the recent case was done by Easton Detective Sgt. John Lynn.

Lynn can do some of the work that HEAT does, like process cell phones.

Lynn came to the department with a degree in computer science and has always done this type of work as part of his job.

“Tools have gotten better over the years,” he said. “Digital evidence is involved in nearly every single crime these days.”

Another local department, in Raynham, has been in front of cyber issues since a former chief, Lou Pacheco, took a particular interest in the issue.

He started an outside company in 2001 called REACCT that handles Internet crime issues, although much of that work has now been incorporated back into the department. Large police departments such as Boston and Brockton used to bring work to REACCT.

“Departments have been forced to become more tech savvy,” said Tim Grabarz, a part-time Raynham police officer who deals with cyber crime.

“It think it’s always been there,” he said of cyber crime. “It’s become more pervasive because the Internet’s become larger and larger.”

He said that as demand grows, it behooves local departments to bring more of the computer forensics in-house.

“Labs are getting pretty jammed up, the turnaround times are getting larger and large,” Grabarz said.

How much tech work each department does in-house varies and often hinges on whether a town has an officer trained on and interested in computers.

If Bridgewater has to have a phone processed, the town sends it to the HEAT lab at the Plymouth County Sheriff’s Department.

Article source:

View full post on National Cyber Security

Page 1 of 212»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?

Find Out More, Click Here!