-
Eleven questions to ask -- and answer -- about your organization's crisis plan
The H1N1 influenza virus has caused anxiety as businesses, schools, and governments contemplated the prospect of widespread quarantines and shutdowns; other disasters may have similar consequences; is your organization ready?
-
-
New technology locks up Biometrics
Communication encryption relies on authentication being symmetric to work: the user’s password or PIN must match the password or PIN stored by the recipient (online shop, bank, etc.) to lock and unlock the data; biometric may be used for encryption — but biometrics is not a symmetric process; South African researchers now show how biometrics can nevertheless be used to make a consistent secret key for encryption
-
-
Nasal vaccine developed for swine flu
Maryland-based Medimmune developed a nasal vaccine for the swine flu; so far, the U.S. government has ordered 12.8 million doses of H1N1 vaccine from Medimmune for $151 million and could order millions more doses
-
-
ImageID tracks and traces cargo -- for better business and tighter security
ImageID’s Visidot system uses high-powered cameras and lighting that scan tags and barcodes more quickly and efficiently than hand-held scanning systems do — and at a much lower price than RFID systems
-
-
Apple says jailbreaking may knock out transmission towers
The Electronic Frontier Foundation (EFF) asked the U.S. Copyright Office to instruct Apple to allow “jailbreaking ” — that is, modification of the iPhone’s software without Apple’s approval; Apple responded that modifying the iPhone’s operating system could crash a mobile phone network’s transmission towers or allow people to avoid paying for phone calls
-
-
Encouraging student technology start-ups
Wolverhampton University’s program gives students the opportunity to set up their own business while they are still at university
-
-
Force Protection to upgrade MRAPs
Providing IED-resistant vehicles — Mine Resistant Ambush Protected, or MRAP — to the U.S. military is a growing business; South Carolina-based Force Protection, a manufacturer of the Cougar MRAP, upgrades the Cougar’s suspension
-
-
Addressing cloud computing confusion
New report sheds light on federal government cloud computing progress; industry and government are at equal cloud adoption pace
-
-
Taser shows multi-shot stun gun
The new device is capable of shocking three people without having to reload
-
-
IBM acquires Ounce Labs
Securing software code is a growing business, and IBM is buying code security specialist Ounce Labs
-
-
Northrop Grumman opens new cybersecurity center
Northrop opens its Cyber Security Operations Center (CSOC) in suburban Maryland; the center will monitor the company’s more than 105,000 clients and 10,000 servers worldwide; more than 1.5 billion daily cyber events that occur on the Northrop Grumman network
-
-
Dayton's new UAV center receives initial funding
UAVs are becoming more and more ubiquitous in military and homeland security missions; Dayton, Ohio — a neighbor to Wright-Patterson Air Force base — wants to capitalize on the UAV trend, and it opens a new UAV technology center
-
-
Biometrics tunnel helps identify individuals' unique walking patterns
The University of Southampton’s biometric tunnel provides the technology to analyze the way people walk as a unique identifier; university researchers have developed a technology which captures the unique walking patterns, and then characterizes and records them to a database
-
-
Defcon, Black Hat to open this week
Leading cybersecurity events to open in Las Vegas this week; if you prefer security shows at which the speakers favor black T-shirts and dyed hair over suits and ties, and where goth-attired groupies and script kiddies hunkered over laptops line the hallways at all hours of the night, you should attend
-
-
Vcom3D's iPod translator device is a valuable tool for U.S. soldiers
Florida-based Vcom3D developed software which was used in conjunction with Apple’s iPod to teach sign language to hearing-impaired students; now, the U.S. military and UN peacekeepers use the device as an instant translator in war-torn regions
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
By Gatra Priyandita and Bart Hogeveen
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
By Christina Pazzanese
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
By Bing X
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
By Josh Blatt
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.