Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Disasters

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • How to secure the new data center

    Virtualization is disruptive, and it changes the rules for how companies secure — or, rather, ought to secure — their data and their computing infrastructure

    • Read more
  • DHS's inspector general to take a close look at FEMA

    IG predicts that the number of FEMA investigations outnumber those planned for any of the ten other DHS divisions; for 2008, the IG plans to produce 173 management reports — 53 on FEMA and 31 on the department’s management division

    • Read more
  • Flock of small UAVs to track storms

    University of Colorado researchers develop a small UAV — weighing 250 grams and with a wingspan of half a meter; they plan to fly dozens, if not hundreds, of them in swarms for the purpose of early detection of storms; UAVs will eventually be connected to mini submarines

    • Read more
  • Spyware poses greatest threat to enterprise

    Spyware now poses the biggest security threat to organizations, while threats from worms, viruses, and browser-based attacks have lessened

    • Read more
  • Security software may be posing security risks

    Security maven Thierry Zoller says that file-parsing bugs in security software could become a big problem: Increasing your use of antivirus software only increases the chances that you could be successfully attacked

    • Read more
  • Researchers find that pre-satellite hurricane counts are quite accurate

    A statistical model based on the climate factors which influence Atlantic tropical storm activity shows that the estimates currently used are only slightly below modeled numbers and indicate that the numbers of tropical storms in the recent past are increasing

    • Read more
  • Number of natural disasters quadrupled in last two decades

    The number of natural disasters occurring now is four times larger than twenty years ago, Oxfam says; number of people affected by extreme natural disasters has surged by almost 70 percent

    • Read more
  • Pay attention to the human element in IT security

    As far as information security is concerned, even the world’s best technological solution cannot replace a piece of paper –- the company security policy

    • Read more
  • VoIP can be made secure for business purposes

    Many companies have security worries about VoIP, so they decide not to implement the technology even though it has many cost advantages over traditional telephony, Cisco’s Eric Vyncke argues that with proper attention and maintenance, VoIP can be made secure enough even for business purposes; A combination of secure switches, firewalls, and secure devices will not produce 100 percent security, but it can approach 99.9 percent,” he said

    • Read more
  • U.K. employers not prepared for flu calamity

    Fewer than a quarter of U.K. companies have made adequate plans for coping with a flu pandemic; 30 percent of businesses have no strategy at all, while 14 percent have but rudimentary continuity plans

    • Read more
  • Aussies debate creation of DHS-like super-department

    Kevin Rudd, leader of Australia’s opposition Labor Party, has proposed the creation of a DHS-like agency to coordinate responses to terrorism and natural disasters; critics say that the current, decentralized Australian first-response system is better

    • Read more
  • IBM's largest acquisition ever: $5 billion deal for Cognos

    IBM is making its largest acquisition ever: It is buying Cognos for $5 billion in cash, hoping to keep pace with rivals in business intelligence software

    • Read more
  • TI licenses Elliptic Curve Cryptography (ECC) technology

    TI prepares for the future: Company notices two trends — growing shift toward e-documents, and increasing need for NIST-based security protocols compliance; TI licenses Certicom ECC technology

    • Read more
  • U.K. says avian flu strain in Suffolk and Norfolk highly pathogenic

    Government confirms the presence of highly pathogenic H5N1 strain in south-east U.K.; protection zone imposed, full epidemiological investigation continues

    • Read more
  • Teenager drills a hole in ammonia pipeline, forcing evacuation

    Three teenagers believed money was hidden in 6-inch-diameter ammonia pipeline, so they drilled a hole in it; cloud of amonia forces evacuation, road closure

    • Read more
  • « first
  • ‹ previous
  • …
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • …
  • next ›
  • last »

More headlines

  • Noem’s vow to “eliminate” FEMA raises alarms
  • FEMA already in turmoil as Trump officials vow to eliminate the agency
  • The pioneering science linking climate to weather disasters
  • FEMA’s Role in Migrant Assistance: Exploring the Shelter and Services Program
  • Federal personnel are facing threats during hurricane response, DHS chief warns
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Helene and Milton reveal an emerging challenge for first responders: EV batteries catching fire
  • Wash. Guard, Thai Partners Prepare for the Unexpected During Disaster Relief Exchange
  • Mayorkas warns FEMA doesn't have enough funding to last through hurricane season
  • FEMA cuts disaster aid ahead of shutdown
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • The Surprising Reasons Floods and Other Disasters Are Deadlier at Night

    It’s not just that it’s dark and people are asleep. Urban sprawl, confirmation bias, and other factors can play a role.

    • Read more
  • Why Flash Flood Warnings Will Continue to Go Unheeded

    Experts say local education and community support are key to conveying risk.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies