Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • CYBERSECURITYMarket Incentives and Cybersecurity: Fixing the Broken System Before It Breaks Us

    By Rajiv Shah and Debi Ashenden

    Cybersecurity is not just an IT issue; it is a shared responsibility and an economic imperative. Only by ensuring resilience can we confidently adopt new technology and realize its benefits. The next horizon of the cyber security strategy would require a mix of incentives—including regulation, market forces and cultural change—to realize the objective of building a secure and resilient digital economy.

    • Read more
  • RESILIENCE Power-Outage Exercises Strengthen the Resilience of U.S. Bases

    By Kylie Foy

    In recent years, power outages caused by extreme weather or substation attacks have exposed the vulnerability of the electric grid. Now mandated by law, Lincoln Laboratory’s blackout drills are improving national security and ensuring mission readiness.

    • Read more
  • CYBERSECURITYComputer Scientists Boost U.S. Cybersecurity

    By David Danelski

    As cyber threats grow more sophisticated by the day, researchers are making computing safer thanks to federally funded research that targets some of the internet’s most pressing security challenges.

    • Read more
  • CYBERSECURITYRobustly Detecting Sneaky Cyberattacks That Might Throw AI Spacecraft Off-Course

    By Shamim Quadir

    Cyberattacks on future, AI-guided spacecraft could be thwarted by unpicking what the AI has been “thinking.”

    • Read more
  • CYBERSECURITYCybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams

    By Ioana Patringenaru

    Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams. Study involving 19,500 UC San Diego Health employees evaluated the effectiveness of two different types of cybersecurity training.

    • Read more
  • POLARIZATIONInfluencers, Multipliers, and the Structure of Polarization: How Political Narratives Circulate on Twitter/X

    A recent study provides a nuanced understanding of the mechanisms driving polarization and issue alignment on Twitter/X and reveals how political polarization is reinforced and structured by two distinct types of highly active users: influencers and multipliers.

    • Read more
  • POWER-GRID PROTECTIONProtecting the Grid with Artificial Intelligence

    The electric grid powers everything from traffic lights to pharmacy fridges, but it regularly faces threats from severe storms and advanced attackers. New neural network detects physical issues, cyberattacks.

    • Read more
  • EXTREMISMHashtags and Humor Are Used to Spread Extreme Content on Social Media

    Conspiracy theories and incitement to harassment and violence abound on mainstream social media platforms like Facebook and Instagram. But the extreme content is often mixed with ironic play, memes and hashtags, which makes it difficult for authorities and media to know how to respond.

    • Read more
  • RANSOMWARELarge Language Models Can Execute Complete Ransomware Attacks Autonomously

    Study demonstrates AI systems can carry out full attack campaigns, a warning to cybersecurity defenders.

    • Read more
  • CYBERSECURITYHow AI Can Ease Workloads for Frontline Cybersecurity Teams

    By A 10-month trial has shown how large language models can assist cybersecurity analysts during live cyberthreat investigations to boost productivity and trust.

    A 10-month trial has shown how large language models can assist cybersecurity analysts during live cyberthreat investigations to boost productivity and trust.

     

    • Read more
  • CYBERSECURITYCodemakers Race to Secure the Internet as Quantum Threat Looms

    By Anthony King

    With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats.

    • Read more
  • ELECTION SECURITYVoting from Your Sofa Is Secure Enough – but Will It Be Allowed?

    By Sølvi Normannsen

    A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.

    • Read more
  • DEEPFAKESAustralia’s Deepfake Dilemma and the Danish Solution

    By Andrew Horton and Elizabeth Lawler

    Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of how to achieve this, policymakers should look to the innovative legal thinking emerging from Denmark.

    • Read more
  • CHINA WATCHDigital Siege Puts Taiwan’s Resilience to the Test

    By Nathan Attrill

    The most sustained conflict unfolding between China and Taiwan is not taking place on the water or in the air; it is happening in cyberspace.

    • Read more
  • AIHow Poisoned Data Can Trick AI − and How to Stop It

    The quality of the information that the AI offers depends on the quality of the data it learns from If someone tries to interfere with those systems by tampering with their training data –either the initial data used to build the system or data the system collects as it’s operating to improve –trouble could ensue.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • EXTREMISMWhat Does Netflix’s Drama “Adolescence” Tell Us About Incels and the Manosphere?

    By Lewys Brace

    While Netflix’s psychological crime drama ‘Adolescence’ is a work of fiction, its themes offer insight into the very real and troubling rise of the incel and manosphere culture online.

    • Read more
  • CYBERSECURITYConfronting Core Problems in Cybersecurity

    By Sara Frueh

    It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul —a testament to how disruptive these attacks have become.

    • Read more
  • ELECTION SECURITYVoting from Your Sofa Is Secure Enough – but Will It Be Allowed?

    By Sølvi Normannsen

    A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies