Subscribe
Magazine + Enews
Enews
Command
Procedures & Policies
Technology
Training
Patrol
Point of Law
Investigations
Weapons
Vehicle Ops
Special Units
Directory
Search
Article
Blog
Event
Media Gallery
News
Podcast
Press Release
Product
Video
Webinar
Whitepaper
Command
Investigations
Patrol
Point of Law
Procedures & Policies
Special Units
Technology
Training
Vehicle Ops
Weapons
Enter search phrase
Search
296 Results
Technology
Cyber Security: Locking Down the Databases
Computer security is one of the primary concerns for many of the nation's companies and government agencies. Billions of dollars is spent each year on preventing external threats from entering protected networks. But the sad truth is that most computer network breaches are caused by sloppy internal security policies and procedures.
August 7, 2014
Technology
Should cities place the person responsible for CJIS compliance or cyber security of systems in the city under the direction of the police department?
Vigilant Solutions
Section 3 of the FBI-CJIS Security Policy defines Roles and Responsibilities for an agency. With regard to this specific question, the answer is that the responsibility for this can be in either department.
April 14, 2016
Training
Guides Help Counter Cyber Attacks
The National Institute of Standards and Technology (NIST) has published four new computer security guides to countering cyber attacks.
November 12, 2002
Technology
FLEOA Issues Statement on Latest Federal Security Hack
The government's leisurely reaction to these cyber incidents continues to put the personal information of federal employees in jeopardy, particularly those with high-level security access.
February 9, 2016
Training
DHS Unveils Major Expansion of ICE Cyber Crimes Center
The expanded ICE Cyber Crimes Center in Fairfax, Va., will provide ICE's Homeland Security Investigations (HSI) with enhanced operational and training capabilities in order to meet the growing cyber mission of the agency and increasing workload of criminal cases with a cyber-nexus.
July 22, 2015
Technology
Special Report: Mission Critical Communications
LDV USA, Nuance Communications Inc., Spillman Technologies, A Motorola Solutions Co.
In POLICE Magazine’s Special Report: Mission Critical Communications, learn about the new role of radios on duty, first responder networks, advancements in 911 call center technology, cyber security, getting grant funding for communications equipment, and how to work with dispatchers.
July 19, 2018
Technology
MSAB and Berla Align to Provide Solution for Device and Vehicle Forensics
MSAB, known in forensic technology for mobile device examination, and Berla, known for automotive digital forensics and cyber security, announced a strategic partnership designed to afford users a game changing solution to access and analyze data from both vehicles systems and mobile devices.
December 11, 2016
Technology
What is the FBI-CJIS Security Policy?
Vigilant Solutions
The Federal Bureau of Investigation (FBI) created the FBI-Criminal Justice Information Services Division Security Policy (FBI-CJIS Security Policy) to provide authorized agencies with a security management structure for accessing, protecting and safeguarding...
March 31, 2016
Technology
Dallas to Buy Cyber Attack Alert System After Police, Other Agencies Hit by Ransomware Attack
The City Council, without discussion, approved allowing Houston-based technology service provider Netsync Network Solutions to help the city get a threat and anomaly detection system for the Information and Technology Services Department for three years.
June 28, 2023
Technology
Cybersecurity to be Spotlighted at IWCE 2016 in March
Cybersecurity is a key topic that will be highlighted at International Wireless Communication Expo (IWCE), the premier annual event for communications technology professionals, scheduled to take place March 21–25, 2016 at the Las Vegas Convention Center.
February 16, 2016
Technology
FBI Announces Significant Arrests in Cyber Sting Operation
Operation ‘Wire Wire’ was a coordinated law enforcement effort by the U.S. Department of Justice, U.S. Department of Homeland Security, U.S. Department of the Treasury, and the U.S. Postal Inspection Service.
June 11, 2018
Technology
Congress Approves Cybersecurity Legislation
The House Thursday unanimously passed S. 2519, the National Cybersecurity Protection Act of 2014 which the Senate passed earlier this week, as well as Senate amendment to H.R. 2952, the Cybersecurity Workforce Assessment Act -- both bipartisan legislation to strengthen the nation’s cyber defenses.
December 12, 2014
Patrol
Cellebrite Launches FedRAMP Authorization Process to Provide Enhanced Cloud Security
Through its collaboration with Coalfire, Cellebrite will offer federal customers access to its SaaS technology. Cellebrite has launched the process to authorize its software-as-a-service (SaaS) offerings with the Federal Risk and Authorization Management.
March 15, 2024
Technology
Track Star AVLS CAD/RMS Interface
Track Star International, Inc.
Track Star has enhanced the Track Star AVLS system by expanding its ability to receive and display CAD/RMS data in the AVL system along with vehicle and asset locations.
July 1, 2021
Technology
Online Security for Cops
I know we're all proud of our vocation. We want to show pride, professionalism and sometimes a little of bravado. Just keep it off the 'net!
January 23, 2012
Technology
Northcentral University's Computer Information Security Program Certified at Highest National Level
Northcentral University's School of Business and Technology Management (SoBTM), Computer Information Security (CIS), Management of Information Security (MIS), and Applied Computer Science (CS) online courses have been certified at the highest national level by National Security Systems (CNSS).
May 26, 2009
Technology
New Challenges in Cyber Forensics
Today's digital investigator must learn how to extract evidence from drones, encrypted portable devices, cryptocurrency trades, and a growing range of appliances and products defined as the Internet of Things (IoT).
July 13, 2018
Technology
Cyber Terrorism: Preventing Online Assault
Hackers constantly target law enforcement. Whatever the intent, with our dependence on technology it's more important than ever that police agencies protect themselves against cyber terrorist attacks.
September 19, 2014
Page 1 of 17
Next Page