This blog concentrates on the role computers play in the processs of practicing and detecting fraud. Learn how to fashion your computer to protect yourself here.
Learn all about computer forensics from this well known forensic computer technologist.
This blog instructs its readers, and future spies, on the craft of building strong securities systems. Information security is the main focus, but ROI maximization is also a theme.
A Counter Intelligence Specialist helms this blog, which focuses on the evolution of eavesdropping today. Google's AutoComplete and its spy capacity have been recently debated here.
This blog focuses on the history of business intelligence and the role dashboards played in it. Those interested in the equipment's contemporary ability will be pleasantly surprised here.