Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Economic slowdown notwithstanding, new startups are optimistic

    Recession or no, Wayne Crosby of Mixin Capital says it is a good time to launch a startup; “I think if you’re an entrepreneur,” he said, “you’re always an entrepreneur, regardless of what the economy is doing”

    • Read more
  • Questions raised about private inspections of food companies

    What the mortgage meltdown did to the financial services sector, the recent salmonella outbreak has done to to food industry: critics charge that both cases exposed the inherent weaknesses of industries regulating and inspecting themselves

    • Read more
  • Aussie students develop new way to visualize fingerprints left on paper

    Two University of Technology, Sydney students develop a method which relies on the application of heat to the sample, with the fingerprint development accomplished in a matter of seconds

    • Read more
  • Large defense contractors look for cyber-security business

    Cyber attacks on U.S. government networks and private companies have grown exponentially; the result is a vast increase in the attention paid to, and money spent on, cyber security; the biggest U.S. military contractors are counting on winning billions of dollars in work to protect the U.S. federal government against cyber attacks

    • Read more
  • Air France begins trial of biometric boarding cards

    Air France begins trials with biometric cards as a replacement for boarding passes; the RFID-equipped cards store the passenger’s fingerprints and may be re-used up to 500 times

    • Read more
  • Critic: U.K. fraud strategy "more worthy of Uzbekistan"

    Business fraud costs Britain £14 billion a year; the U.K. government today launched its National Fraud Strategy, but a Cambridge professor harshly criticizes the initiative

    • Read more
  • Leading browsers easily felled at hacker contest

    Students at a hacker convention easily breach the protections built into Safari, IE 8, and Firefox; contestants do so in front of appreciative spectators and in a matter of hours

    • Read more
  • CSC to help combat cyber warfare

    Cyberattacks pose a major threat to the welfare and security of developing countries; developing protection against that threat offers business opportunities

    • Read more
  • IDO Security shoes-on inspection device adopted by several airports

    Taking your shoes off for airport security checks is a hassle; a shoes-on inspection devise is gaining popularity

    • Read more
  • U.K. government flags ID cost increase

    The U.K. government says that passports will account for a smaller proportion of the cost of the national identity scheme’s overall cost than previously stated; introducing and producing passports containing fingerprints will cost about 70 percent of the £4.785 million budget for the National Identity Scheme for U.K. nationals

    • Read more
  • European Commission calls for single EU patent

    EC says that the absence of a single Europe-wide patent law is hindering the growth of technology companies in the European Union

    • Read more
  • Yoran: Better metrics needed for security

    Amit Yoran says that the security industry is awash in bad data, and that companies that attempt to use the metrics could take the wrong actions

    • Read more
  • Iris recognition on-the-move tested at Schiphol Airport

    Sarnoff Corporation promises to make it faster and easier to verify users through iris scanning technology; Schiphol Airport want to know more about it

    • Read more
  • Handling nuclear materials for less

    During this century, nuclear plant decommissioning in the United Kingdom will likely produce thousands of waste packages that will be retrieved, conditioned, and stored for no less than £40 billion; BNS develops new way to reduce storage and handling costs of radioactive material

    • Read more
  • U.S. searching for a nuclear waste graveyard

    Congress has killed the Yucca Mountain nuclear repository project, so the United States has no central location for storing nuclear waste; 50,000 metric tons of toxic nuclear waste that has already been produced by the U.S. nuclear plants; 30,000 metric tons more of nuclear waste is expected to be generated in the coming decades

    • Read more
  • « first
  • ‹ previous
  • …
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • …
  • next ›
  • last »

More headlines

  • Researchers report increased ransomware and hacktivist activities targeting industrial systems in 2025
  • New Study Claims GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
  • UL Solutions withdraws as lead admin for FCC cyber label program amid probe into China ties
  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Even Out of China’s Hands, Mines Still Rely on Its Equipment

    The landmark critical minerals agreement between Australia and the United States is vital to both nations’ security and sovereignty. But the agreement signed carries an inherent vulnerability. The very partnership designed to reduce China’s coercive leverage is increasingly relying on Chinese technology to give effect to its objectives.

    • Read more
  • Building Trust into Tech: A Framework for Sovereign Resilience

    Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.

    • Read more
  • Data Centers’ Insatiable Demand for Electricity Will Change the Entire Energy Sector

    When the first large language models were unleashed, it triggered a headache for authorities around the world as they tried to figure out how to satisfy data centers’ endless demand for electricity.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies