-
New facial, gait recognition software to be integrated in CCTVs
BAE Systems and OmniPerception work on developing a gait and facial behavior recognition to be integrated into street corner CCTVs; it will make identifying known criminals easier
-
-
BIO-key reports profitability for Q4, full year 2008
Total revenue from continuing operations for the quarter ending 31 December 2008 was $3.9 million, representing an increase of 47 percent from the $2.6 million reported in the fourth quarter of 2007
-
-
PerSay in strategic partnership with INS Indriya in Singapore
A leading voice recognition biometrics partners with a Singaporean technology consulting firm; voice recognition is slowly spreading in both e-commerce and in intelligence and law enforcement
-
-
BAE Systems shows robust 2008 financial results
Europe’s largest defense contractor sees profits for 2008 rise by 93 percent to £1.7 billion from £901 million a year earlier; sales were up 18 percent to £18.5 billion, and full-year earnings before interest, tax, and amortization rose to £1.9 billion — a 30.9 percent increase on the previous year.
-
-
BriefCam video synopsis integrated in Pelco's DVR
BriefCam’s technology integrated with Pelco’s DX8100 series of digital video recorders; solution allows for one day of surveillance camera footage to be summarized into as little as a few minutes
-
-
Unisys: Technology "consumerization," mobility risks key drivers of security investments
A Unisys briefing says that the growing pervasiveness of technology consumerization and mobility opens businesses to new risks across a broader spectrum; economy compels greater need for collaboration, more intelligent systems, and better fraud prevention; biometric use and acceptance also to increase
-
-
Microsoft offers reward for catching worm creator
Microsoft offered a reward of $250,000 to find who is behind the Downadup/Conficker virus; since it started circulating in October 2008 the Conficker worm has managed to infect millions of Windows computers
-
-
Regulators cannot cope with food counterfeiting, contamination
New worry: Between the extremes of accidentally contaminated food and terrorism via intentional contamination, lies the counterfeiter, seeking not to harm but to hide the act for profit
-
-
Researchers spoof, bypass face-recognition authentication systems
Vietnamese researchers have cracked facial recognition technology in Lenovo, Asus, and Toshiba laptops; the researchers demonstrated feat at this week’s Black Hat DC event
-
-
Carnegie Mellon to join new biometrics center
Aim of the new center — called Center for Academic Studies In Identity Sciences (CASIS) — is to provide the U.S. intelligence community with a pool of talented researchers in biometrics
-
-
Saving money and increasing security by using guard tracking device
New Jersey-based company offers GPS-enables guard tracking device which can tell, and keep record of, where guards are at any moment in time; such tracking increases companies’ security and may also reduce their insurance premiums and their legal exposure
-
-
L-1 Identity Solutions reports Q4 and 2008 results
Revenue for the Q4 2008 increased to $147.5 million compared to $113.9 million in Q4 2007; revenue for the twelve months ending 31 December 2008 was $562.9 million compared with $389.5 million for the twelve months ending 31 December 2007
-
-
Raytheon offers airborne radar for India's homeland security
India is paying more attention — much more attention — to homeland security in the wake of the November 2008 Mumbai bombing; among the first priorities is securing the very long coast lines of the country; Raytheon, already a presence in India, stands to benefit
-
-
Growing crime in Central America boon to private security companies
A combination of a dramatic increase in crime — from drug-related murders to kidnapping for ransom — and a growing perception that government agencies cannot or would not do much about it, have led to a boom for private security companies in Central and Latin America
-
-
IT security jobs largely untouched by economic slowdown
New reports describe a surprising stability in the information security job market amid all the cost-cutting and layoffs that are taking place; regulatory compliance demands, increasing data protection requirements stemming from wireless deployments and rollouts of virtualization technology, and growing consumer angst over data breaches combine to blunt the toll recession takes on information security jobs, salaries
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.