Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Biometric technologies

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Exporting biometrics outside the U.S. by the book

    The U.S. government controls the export of biometric hardware, software, and technologies; U.S. biometric companies would be wise to comply with the various control regulations

    • Read more
  • Biometric security to drive $7.3 billion in five years

    Over the next five years, systems with multitechnology, multivendor capabilities will drive adoption in both public- and private-sector applications, ABI said

    • Read more
  • An HS Daily Wire conversation with Robert Horton of Motorola

    Motorola’s Biometrics Business Unit has more than 300 customers in 40 countries; Robert Horton, director of Portfolio Management & Strategy, Biometrics Business Unit, Motorola, expects an increased number of deployments incorporating Motorola’s multi-modal and Mobile ID functionality with seamless mobility

    • Read more
  • Pocket-sized, portable, private: the plusID Personal Biometric Token

    John Petze, CEO of Privaris, about the plusID: “The security system wants proof of identity. Wouldn’t it be possible to satisfy that demand with something that can be carried on the person? Well, it is possible.”

    • Read more
  • Identity is a matter of who you are

    The next step for business and government is to define and maintain a consistent global approach to applying security enhancing solutions within an ethical privacy framework

    • Read more
  • New crime: Forged eye biometrics recognition stamps

    How accurate is iris scanning biometric technology? read on: Three individuals are arresed at the Dubai airport for smuggling forged eye biometrics recognition stamps; the criminals’ goal: to facilitate the entry to the UAE of individuals who were previously banned

    • Read more
  • US-VISIT

    James Jasinski, CEO, Cogent Systems, comments on a young program that is discharging an immense responsibility

    • Read more
  • Biometrics by the numbers

    Fingerprint biometric is the oldest and most popular biometric technology; a tech blogger finds flaws in it we should be addressed

    • Read more
  • Stanley closes Oberon acquisition

    Purchase puts integrator on the biometrics fast track, enabling it to compete with some of the largest systems integrators in the government market for opportunities with the Defense Department

    • Read more
  • U.K. nursery chain install biometric access control

    Fourteen Busy Bees children’s nurseries install biometric access control from UK Biometric; access control will allow entry only to parents and care-givers

    • Read more
  • Aussie biometrics system recognized

    the Security Network, a non-profit industry body, declares BRS’s BioLock+ the “Most Innovative Security Product”

    • Read more
  • Draft security publication looks at cell phones, PDAs

    PDAs are offering more and more features, and more people now use them; NIST publishes a draft guidelines on security considerations for cell phones and PDAs

    • Read more
  • Voice biometrics solves PINs-related security problems

    Survey shows that bank customers are worried that PINs, passwords, and security questions may not be the most viable ways of identifying individuals when it comes to accessing their details; researchers say voice biometrics is the solution

    • Read more
  • Sagem Morpho shows TWIC-compliant biometric reader

    Card is designed to read encrypted biometric data, such as a digital fingerprint, perform the match to the card holder, and perform an active card authentication across a contactless interface

    • Read more
  • Smart-card manufacturers sues to suppress security flaw information

    NXP Semiconductors is suing Radboud University Nijmegen to prevent university researchers from presenting a paper in an October conference on IT security; paper in question details serious security flaws in the company’s RFID chip

    • Read more
  • « first
  • ‹ previous
  • …
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • …
  • next ›
  • last »

More headlines

  • Real ID will change flying within the U.S.
  • Withdraw of REAL ID Act requirements for driving licences temporarily as mDLs accelerate
  • Alumni of Human Identification Lab Attest to Its Influence
  • Congress rejects funding increase for DHS biometric system, directs independent review
  • Texas sues Google over biometric recognition features
  • CBP, Princess Cruise Line Introduces Facial Biometrics at Port of San Francisco
  • Israeli firm develops body cams with facial recognition
  • DHS wants AI forces working more as a department-wide team
  • Report Sheds light on extensive federal use of facial recognition technology
  • Who in America is standing up to privacy-bothering facial-recognition tech? Maine is right now leading the pack
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies