Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.S. Senate ends production of F-22 fighter

    The contentious debate about whether or not to continue production of Lockheed Martin Corp.’s F-22 fighter jets beyond the 187 now on order has ended: the Senate votes 58-40 for an amendment striking $1.75 billion for seven more F-22s from a defense spending measure

    • Read more
  • Concerns over E-Verify effectiveness as illegal immigration detentions drop

    The Obama administration has mandated that by 8 September, all contractors who do work with the federal government must use E-Verify to ensure their prospective employees can legally work in the United States; senators say it is too easy to fool the current E-Verify system

    • Read more
  • EADS wins large Saudi border protection deal

    EADS’s win of the massive Saudi border fencing contract, valued at $2.3-2.8 billion, is part of the defense contractors effort to use homeland security projects as a means to bolster its revenues

    • Read more
  • The business aspects of get-tough immigration policy

    The post-9/11 get-tough policy toward immigration has meant booming business for private prison-management companies; the building of prisons and detention centers is now a much-needed source of income for cash-strapped rural communities

    • Read more
  • U.S. halts uranium mining at Grand Canyon

    The Interior Department has barred the filing of new mining claims, including for uranium, on 1 million acres near the Grand Canyon

    • Read more
  • DARPA awards Cobham $15 million for wireless network

    DARPA awards Cobham a contract calling for the company to develop low-cost wireless network nodes which support adaptation by means of distributed network processing

    • Read more
  • Google, Microsoft promise new age in cyber-security

    Security-conscious consumers are in the habit of regularly updating their antivirus software; this will soon be unnecessary — this, at least, is the promise of both Microsoft and Google; the two companies’ new operating systems will include built-in, continuously updated defenses against viruses and malware

    • Read more
  • Trend: Businesses increasingly rely on SAS for security

    More and more companies have gravitated toward the idea of “software as a service” (SAS) — using software that is delivered remotely instead of hosted on in-house servers; more and more companies are now offering security products as services — but is it the best approach to security?

    • Read more
  • Raytheon wins $155 million wireless contract

    DARPA awards Raytheon $155 million to provide a military wireless network interoperable gateway

    • Read more
  • Houston computer forensics lab accredited

    Newly accredited Houston lab expands Regional Computer Forensics Laboratory Network (RCFL), a national network of sixteen FBI-sponsored digital forensics laboratories and training centers devoted entirely to the scientific examination of digital evidence in support of criminal investigations

    • Read more
  • Investment in R&D sees thriving biometric markets

    With security remaining a top priority at all levels of U.S. government, the biometrics market is seeing market stability and returns on their investments in R&D

    • Read more
  • Officials complain about northern border policy

    Five-hundred government officials, policy experts, and business leaders from the United States and Canada gather to discuss the impact of security measures along the U.S.-Canada border on commerce; their conclusion: What is good for the U.S.-Mexico border may be unsuitable for the U.S.-Canada border

    • Read more
  • GSA adds more cybersecurity software to SmartBuy program

    GSA estimates the contracts could be worth $20 million over five years

    • Read more
  • Cyber crime bigwigs using big-business tactics

    Cisco cybercrime reports says “The novel thing is that [cybercriminals] have taken the Harvard Business School, General Electric board room business training and applied it to their old techniques”

    • Read more
  • Local flexibility required to ease border crossing, facilitate commerce

    Canada and the United States are the world’s two biggest trading partners — with $596 billion in trade in 2008; new report says that tight U.S.-Canada border rules are bad for business

    • Read more
  • « first
  • ‹ previous
  • …
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Is big tech harming society? To find out, we need research, but it's being manipulated by big tech itself
  • US bans new types of goods from China over allegations of forced labor
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Nuclear Has Changed. Will the U.S. Change with It?

    Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.

    • Read more
  • Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports

    Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.

    • Read more
  • Exploring the New Nuclear Energy Landscape

    In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies