Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Intransa VideoAppliance named 2009 New Product of the Year

    Intransa VideoAppliance, introduced in June 2009; a panel of judges for Security Products Magazine names it 2009 New Product of the Year in the Network-Centric Security category

    • Read more
  • Competition intensifies in high-definition security imaging

    Surveillance has come out of domestic and office environments into the main street in both industrial and developing countries, and the competition among the companies seeking customers at ASIS is likely to remain fierce

    • Read more
  • Panasonic shows array of new technologies

    In addition to enhancing its line of i-Pro Series Network Solutions, Panasonic continues to introduce select analogue products incorporating the latest technologies in support of legacy system

    • Read more
  • Camera manufacturers going HD

    High definition technology gives users the capability to make out faces and license plates more easily, which in the future will also have implications for video analytics, making them more effective

    • Read more
  • Fujitsu asks terrorists whether they would use its software for WMD

    Fujitsu runs a patching site for Sun Microsystems’ Solaris Unix variant; the company asks end-users to fill out a survey before downloading the latest patch, and the first question asks whether the customer would be using the patch to build WMD; even if you admit to building a nuclear bomb, Fujitsu allows you to download the patch; either Fujitsu targets really honest terrorists, or the company wants to use the information in its advertising (as in: “5% of our customers are terrorists who use our software to build weapons of mass destruction”)

    • Read more
  • New cybersecurity research center opens in Belfast

    The £30 million center will work primarily on embedded security tech for next-gen IT equipment, and on real-time automated analysis of CCTV footage for “criminal activity”

    • Read more
  • Open-System Vendors demo IP interoperability

    Exacq Technologies, Firetide, IQinVision, and Pivot3 are showing how standards-based solutions from open-system vendors can be integrated and supported in the field

    • Read more
  • BRS Labs takes ASIS' Accolades award

    This is the fourth award BRS Labs has won this year for its unique approach to security; its AISight’s software ingests external visual input (computer vision), while its machine-learning engine observes the scene, learns and recognizes behavioral patterns, and responds accordingly

    • Read more
  • Team recognized for Hollywood video surveillance implementation

    TimeSight Systems, VAS Security Systems, and Technicolor selected as Silver Medal Winner of the 2009 Security Innovations Awards

    • Read more
  • ASIS International offers standards and guidelines for the security industry

    ASIS standards and guidelines address issues concerning the protection and management of assets — both physical and human — which are common to all sectors of society

    • Read more
  • Clayton Consultants on kidnapping and ransom

    In many developing countries, kidnapping the family members of rich individuals and then asking for ransom has become a small industry; a specialist offers ideas about what to do to prevent kidnapping — and deal with it when it happens

    • Read more
  • Intransa shows new simple, green video solutions

    Some companies go for gold-plated complexity; Intansa prefers simple, green video surveillance solutions for physical security; the company introduces new products and enhancements to old products

    • Read more
  • Protection One unveils uConnect

    Large security provider shows a new, all-in-one online security management solution for businesses of all sizes

    • Read more
  • Rolls-Royce, EDF to construct four nuclear reactors in U.K.

    The civil nuclear market is worth around £30 billion a year globally and is expected to grow to £50 billion a year in fifteen years’ time, more than 70 percent of which will relate to the build and support of new facilities

    • Read more
  • Biometric surveillance checkpoint technology would notice the imperceptible

    Draper Laboratory and collaborators develop technology which will home in on irregular physiological and behavioral biometrics of the individual being screened, such as heart rate, blink rate, and even fidgeting

    • Read more
  • « first
  • ‹ previous
  • …
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Is big tech harming society? To find out, we need research, but it's being manipulated by big tech itself
  • US bans new types of goods from China over allegations of forced labor
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Nuclear Has Changed. Will the U.S. Change with It?

    Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.

    • Read more
  • Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports

    Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.

    • Read more
  • Exploring the New Nuclear Energy Landscape

    In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies