Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Scallop Imaging showcasing a camera with 180 degree field of view

    Traditional security cameras, composed of a single lens and image sensor, either require a number of cameras to cover a 180 degree field of view, or utilize extreme, wide angle lenses that are costly and introduce optical distortion; Scallop has a better solution: distributing this imaging task across five powerful microsensors

    • Read more
  • Intransa VideoAppliance named 2009 New Product of the Year

    Intransa VideoAppliance, introduced in June 2009; a panel of judges for Security Products Magazine names it 2009 New Product of the Year in the Network-Centric Security category

    • Read more
  • Competition intensifies in high-definition security imaging

    Surveillance has come out of domestic and office environments into the main street in both industrial and developing countries, and the competition among the companies seeking customers at ASIS is likely to remain fierce

    • Read more
  • Panasonic shows array of new technologies

    In addition to enhancing its line of i-Pro Series Network Solutions, Panasonic continues to introduce select analogue products incorporating the latest technologies in support of legacy system

    • Read more
  • Camera manufacturers going HD

    High definition technology gives users the capability to make out faces and license plates more easily, which in the future will also have implications for video analytics, making them more effective

    • Read more
  • Fujitsu asks terrorists whether they would use its software for WMD

    Fujitsu runs a patching site for Sun Microsystems’ Solaris Unix variant; the company asks end-users to fill out a survey before downloading the latest patch, and the first question asks whether the customer would be using the patch to build WMD; even if you admit to building a nuclear bomb, Fujitsu allows you to download the patch; either Fujitsu targets really honest terrorists, or the company wants to use the information in its advertising (as in: “5% of our customers are terrorists who use our software to build weapons of mass destruction”)

    • Read more
  • New cybersecurity research center opens in Belfast

    The £30 million center will work primarily on embedded security tech for next-gen IT equipment, and on real-time automated analysis of CCTV footage for “criminal activity”

    • Read more
  • Open-System Vendors demo IP interoperability

    Exacq Technologies, Firetide, IQinVision, and Pivot3 are showing how standards-based solutions from open-system vendors can be integrated and supported in the field

    • Read more
  • BRS Labs takes ASIS' Accolades award

    This is the fourth award BRS Labs has won this year for its unique approach to security; its AISight’s software ingests external visual input (computer vision), while its machine-learning engine observes the scene, learns and recognizes behavioral patterns, and responds accordingly

    • Read more
  • Team recognized for Hollywood video surveillance implementation

    TimeSight Systems, VAS Security Systems, and Technicolor selected as Silver Medal Winner of the 2009 Security Innovations Awards

    • Read more
  • ASIS International offers standards and guidelines for the security industry

    ASIS standards and guidelines address issues concerning the protection and management of assets — both physical and human — which are common to all sectors of society

    • Read more
  • Clayton Consultants on kidnapping and ransom

    In many developing countries, kidnapping the family members of rich individuals and then asking for ransom has become a small industry; a specialist offers ideas about what to do to prevent kidnapping — and deal with it when it happens

    • Read more
  • Intransa shows new simple, green video solutions

    Some companies go for gold-plated complexity; Intansa prefers simple, green video surveillance solutions for physical security; the company introduces new products and enhancements to old products

    • Read more
  • Protection One unveils uConnect

    Large security provider shows a new, all-in-one online security management solution for businesses of all sizes

    • Read more
  • Rolls-Royce, EDF to construct four nuclear reactors in U.K.

    The civil nuclear market is worth around £30 billion a year globally and is expected to grow to £50 billion a year in fifteen years’ time, more than 70 percent of which will relate to the build and support of new facilities

    • Read more
  • « first
  • ‹ previous
  • …
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • …
  • next ›
  • last »

More headlines

  • Researchers report increased ransomware and hacktivist activities targeting industrial systems in 2025
  • New Study Claims GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
  • UL Solutions withdraws as lead admin for FCC cyber label program amid probe into China ties
  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Even Out of China’s Hands, Mines Still Rely on Its Equipment

    The landmark critical minerals agreement between Australia and the United States is vital to both nations’ security and sovereignty. But the agreement signed carries an inherent vulnerability. The very partnership designed to reduce China’s coercive leverage is increasingly relying on Chinese technology to give effect to its objectives.

    • Read more
  • Building Trust into Tech: A Framework for Sovereign Resilience

    Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.

    • Read more
  • Data Centers’ Insatiable Demand for Electricity Will Change the Entire Energy Sector

    When the first large language models were unleashed, it triggered a headache for authorities around the world as they tried to figure out how to satisfy data centers’ endless demand for electricity.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies