• March Networks to acquire Cieffe

    Canadian provider of intelligent IP video acquires innovative designer of award-winning IP video surveillance solutions; acquisition will expand March Networks’ European presence

  • PSA issues Secure America Challenge to candidates

    Top Democrats and Republicans issue bipartisan agenda for next president; Senator Warren Rudman: “Republicans and Democrats can agree that securing global nuclear stockpiles to prevent terrorists from buying or stealing materials for a nuclear weapon is at the top of the agenda”

  • FERC adopts critical infrastructure protection standards

    Federal Energy Regulatory Commission approves eight new mandatory critical infrastructure protection reliability standards; move taken against the backdrop of growing worries in the U.S. intelligence community about attacks on U.S. critical infrastructure

  • EDI to use Xyratex to manage Beijing Airport security

    EDI Technology, a Chinese storage integrator, will use Xyratex F5412E RAID system from Xyratex, a U.K.-based enterprise data storage subsystems and storage process technology provider, for online and archive storage of video surveillance at Beijing Capital International Airport

  • Companies, government responses to war game draw mixed reviews

    Details emerge of a $3 million, invitation-only war game — Cyber Storm —which simulated what DHS described as plausible attacks over five days in February 2006 against the technology industry, transportation lines, and energy utilities by anti-globalization hackers

  • CSX to give Maryland real-time information on hazardous cargo

    Baltimore no longer uses chlorine in their water treatment facilities, yet their citizens are exposed to the toxic substance as trains carrying the hazardous material to facilities elsewhere go through the city; Maryland, rail company reach an agreement on the issue

  • Magal Security Systems receives $45 million in contracts

    Israeli smart-fencing company receives contracts from several U.S. critical infrastructure operators; recent developments along the Gaza-Stip-Egypt border offer Magal new opportunities

  • Mu Security is Technical member of ISA SCI

    ISA Security Compliance Institute aims to promote the integration of disparate security practices — used at critical infrastructure sites, including suppliers to process control customers such as oil refineries, large manufacturing sites, chemical processing sites, and electric power distribution plants — into a single, open framework by establishing the ISASecure designation

  • Israel begins radiation detection at Haifa Port

    More ports join the U.S.-led effort to check for radiological materials; the idea is to have U.S.-bound cargo containers scanned for radiation before they arrive in U.S. ports; the latest port to be added to the list is Haifa, Israel

  • Spam, Q4 Email Threat Trends of 2007

    A steep rise in attacks using social networking techniques which target user psychology and behavior patterns; spammers launched attacks by predicting user behavior patterns, such as looking for easy cash and discounted gifts during the holiday season, and preying on consumer trust to generate interest in cheap pharmaceutical products and stocks

  • IAEA finds South Africa's nuclear facility safe

    On 8 November 2007, the South African nuclear center at Pelindaba was the subject of two mysterious, and simultaneous, attacks; the country’s nuclear monitoring agency, and the IAEA, declare security procedures at the nuclear plant to be satisfactory

  • Funding for developing nuclear clean-up tool

    As nuclear power draws renewed interest — what with the rising price of oil and growing worries about global warming — there is more interest in tools and solutions to help deal with nuclear waste and nuclear clean-up

  • As TWIC is implemented in more ports, hurdles emerge

    Port managers worry that there are still some unresolved issues with TWIC, the port employee credentialing system; one example: Will the card typically be used as a flash pass or will the readers need to be used? If readers have to be used, just think of this: A truck has long mirrors on the outside of the cab, preventing the driver from getting close enough to a reader to submit a fingerprint; moreover, truckers often have dirty hands, which may make it difficult to read the fingerprints; there are other issues

  • American Superconductor's New York grid work moves forward

    Massachusetts-based American Superconductor signed a contract to to develop and install new electrical power-grid technology in New York City which would enable Con Edison better to handle power surges and interruptions caused by accidents, weather or terrorist attacks; after government agencies’ squabble, and congressional examination of the contract, DHS tells company to go forward

  • Disgruntled employee deletes 7-years worth of architectual drawings

    An employee in a Florida architectural firm believed she was about to be fired; she came to the office on Sunday and deleted 7-years worth of drawings and blueprints, valued by the firm at $2.5 million