Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Coverity centralizes code defect checkers

    Coverity’s new Integrity Center was created while the company was analyzing 250 open source code projects on a DHS contract

    • Read more
  • Global network security market to reach $9.5 billion by 2015

    The global network security market continues to witness increasing growth driven by expansion of enterprise networks, growing security threats, increasing adoption of advanced products, and expansion of lesser-developed markets; spurred by favorable trends, the network security market is expected to reach $9.5 billion by 2015

    • Read more
  • AT&T increases reward in cable vandalism to $250,000

    Late last eek vandals cut fiber optic cables in three California counties, disrupting communication and commerce; AT&T increases reward for information which will lead to capturing the vandals

    • Read more
  • Combating a silent attacker: Using information assurance to protect federal agencies // by Stan Tyliszczak

    To defeat the next generation of cyber threats, government agencies will need to not only deploy the latest cyber security tools, but also cultivate and maintain an information security-savvy workforce through concerted, longstanding training initiatives

    • Read more
  • Germany is target of sustained cyberattacks from China

    The German government is constantly the target of hackers seeking to insert spy programs into its computer systems; the attacks are becoming more and more sophisticated

    • Read more
  • Technology companies to enjoy stimulus package funds

    The emphasis of the Obama administration on directing a large portion of the stimulus package toward improving the U.S. infrastructure means the technology companies with the right solutons stand to benefit

    • Read more
  • White House to coordinate cybersecurity efforts

    White House to coordinate securing networks government-wide, identifying more than 250 requirements in an on-going 60-day review of federal cybersecurity initiatives

    • Read more
  • Cobham acquires Argotek for $36.25 million

    U.K. global defense group Cobham, eager to exploit the growing business opportunities in IT security, acquires U.S. IT security specialist Argotek; acquisition requires approval by CFIUS

    • Read more
  • Canada focused on new cybersecurity strategy

    Ottawa is developing a new cybersecurity strategy in light of repeated incursions into the country’s key computer networks

    • Read more
  • Aussie government in $43 billion fast Internet scheme

    The economic slowdown found private Australian telecommunication companies unwilling to fund a high-speed national broadband network, a network which Kevin Rudd’s government believes is essential for the country’s economic competitiveness; the government is stepping in, saying it would invest at least $21.9 billion of taxpayers’ money to get the project going

    • Read more
  • Fighting cyber attacks costs Pentagon $100 million

    The U.S. Department of Defense and military are subject to constant cyber attacks against their networks; the cost of repairing the damage of such attacks — manpower, computer technology, and contractors hired to clean up after both external probes and internal mistakes — is $100 million a year

    • Read more
  • Hackers of U.S. electrical grid left behind "sleeper" software programs

    The U.S. electrical grid has been penetrated by sophisticated hackers who left behind “sleeper” software programs which could be remotely activated to disrupt the system; the intelligence community says it is the work of Russian and Chinese government operatives

    • Read more
  • U.K. Home Office terrorism advisory site offered link to a porno site

    On Monday, a new EU regulation went into effect mandating that ISPs store details of user e-mails and Internet calls; a Home Office site contained a link for citizens who felt the measure was too intrusive, and who would want to send the Home Office a complaint about it; trouble is, those who clicked on the link were sent to a Japanese porno site

    • Read more
  • Aussie company targets CCTV market for its encryption technology

    Melbourne-based network encryption company Senetas Corporation, a leading developer of encryption products, said the growing CCTV market, still in its infancy as far as security is concerned, offers its encryption solutions an attractive opportunity

    • Read more
  • U.S. cybersecurity law to give feds unprecedented Internet control

    Lawmakers draft legislation giving the U.S. government unprecedented authority over the U.S. critical infrastructure, including the power to shut down or limit traffic on private networks during emergencies; the legislation is intended to protect a broad range of the U.S. infrastructure — including networks for the country’s banking industry, utilities, transportation, and telecommunications — from cyber attacks

    • Read more
  • « first
  • ‹ previous
  • …
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • Primary Mitigations to Reduce Cyber Threats to Operational Technology
  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models

    In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.

    • Read more
  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies