Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • How Chinese Companies Are Challenging National Security Decisions That Could Delay 5G Network Rollout

    In many countries, governments have decided to block Chinese companies from participating in building communication infrastructure in their countries because of national security concerns.  Chinese companies and investors often refuse to take such national security changes lying down. With varying degrees of success, firms have mounted a range of formal and informal challenges in recent years.

    • Read more
  • Cybersecurity Defense Software Put Through the Wringer at NATO’s Cyber Coalition 2022

    How might artificial intelligence help NATO allies protect information technology systems, power grids, and other assets?

    • Read more
  • New Method Tracks Groups of Anomalous Users

    Malicious or fictitious users on internet networks have become the bane of the internet’s existence. Many bemoan the increasing presence of such users, but few have developed methods to track and expose them. Until now.

    • Read more
  • $4.8M to Address National Cybersecurity Workforce Shortage

    Oregon State University has received $4.8 million from the National Science Foundation to help the United States close a big gap between the number of cybersecurity job openings and the number of qualified applicants for those positions.

    • Read more
  • Revised Guidelines for Digital Identification in Federal Systems

    NIST’s draft publication features updates intended to help fight online crime, preserve privacy and promote equity and usability.

    • Read more
  • Protecting DoD Microelectronics from Adversary Influence

    The NSA publicly released four Cybersecurity Technical Reports to help the Department of Defense protect field-programmable gate array (FPGA)-based systems from adversary influence.

    • Read more
  • Testing Environments Help Secure Transportation Infrastructure

    “All critical infrastructure sectors—including the energy, manufacturing, and transportation sectors—rely heavily on sophisticated technologies like industrial control systems, cellular networks, and artificial intelligence,” said DHS S&T’s Alex Karr. “These are all accessed, monitored, and controlled via the internet, which, in turn, makes them susceptible to hacking, malware attacks, and other malicious activities.”

    • Read more
  • Content Moderation Sacrificed in Left-Right Deals on Tech Reform

    With time running out on the lame-duck Congress, tech reformers are pushing for votes on a package of bills that stalled over the summer. Three bills—the American Innovation and Choice Online Act (AICOA), the Open App Markets Act (OAMA), and the Journalism Competition and Preservation Act (JCPA)—would write special competition rules for large tech companies in ways that could fundamentally change how tech platforms moderate content like hate speech, disinformation, and incitement to violence.

    • Read more
  • Smart AI Tools Could Protect Social Media Users’ Privacy

    Digital assistants could help prevent users from unknowingly revealing their views on social, political and religious issues by fighting AI with AI, researchers say.

    • Read more
  • New ‘Faraday Cage’ Research Facility to Help Combat Digital Crime

    University of Huddersfield installing a new facility named the ‘Faraday Cage’ which will help speed-up the development and testing of new digital forensic processes to help law enforcement meet the huge growth rate in digital crime.

    • Read more
  • Major Global Security Challenges

    What are the major threats the world is facing? Researchers highlight five such threats: The growing role of disinformation; attacks on the idea of democracy; environmental challenges; economic instability; and terrorism – both domestic and foreign.

    • Read more
  • Mathematics Works in Serendipitous Ways

    In the digital era and moving towards quantum computing, protecting data against hack attacks is one of our biggest challenges. Mathematical theorem used to crack U.S. government encryption algorithm.

    • Read more
  • Smart Inverters’ Vulnerability to Cyberattacks Needs to Be Identified and Countered

    A survey of threats to microgrids from small power sources can help security experts develop solutions.

    • Read more
  • Consumers Feel Left Out of Debates on Cyberattacks and Data Security

    Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.

    • Read more
  • Top Prosecutors in CA, NY and DC Are Speaking Up for End-to-End Encryption

    We all should have the ability to have a private conversation, and it follows that we need ways to communicate privately online as well. In the digital world, end-to-end encryption is our best chance to maintain our privacy and security.

    • Read more
  • « first
  • ‹ previous
  • …
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • …
  • next ›
  • last »

More headlines

  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Recently-patched Firefox bug exploited against Tor browser users
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models

    In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.

    • Read more
  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies