They are out there, watching and waiting for an opportunity to strike - the bad actors who have carefully researched your organization in order to set the perfect trap using easily found public ...
According to the Central Intelligence Agency (CIA), “information does not have to be secret to be valuable.” This holds true when a forensic accountant is investigating an alleged fraud scheme.
Three years ago, I hypothesized that the spread of open-source intelligence, or OSINT, techniques and more publicly available technology would lead to a revolution in intelligence capability for ...
If you find yourself worrying about the latest breach that may have compromised your personal data, or you want to know exactly what about you is online, it is not all that hard to find out. You must ...
Researchers at the Virginia Tech National Security Institute recently used active open-source intelligence techniques to gain a better understanding of how presidential campaigns use email addresses.