-
Hawaii a case study in cross-juristictional emergency cooperation
Earthquake last year offers a model of Hawaii’s can-do attitude; emergency response personell trained to respond to leadership, not rank; power failures doomed radio communications, so planners consider buying backup generators for the island’s radio stations
-
-
Galileo Avionica offers electrical UAV for urban missions
UAVs are growing in popularity, and an Italian company offers a vehicle which is especially designed for urban warfare and special operations: It is an electrically powered UAV which is so small it can be carried in a backpakck
-
-
Javelin finds ID theft on the decline
Survey finds a 12 percent drop in the overall cost of ID theft nationwide; 500,000 fewer victims; teenagers a growing target due to social networking and music sites
-
-
Private sector responsible for infrastructure protection planning
The U.S. government has a role to play in contingency planning for protecting critical infrastructure; security experts and government officials agree, though, that businesses should be self-sufficient when it comes to coping with emergencies; “The government is not going to save you,” said a former DHS official
-
-
Network security: A practical approach by Ilan Meller
Location-based and time-based measures breach physical and logical security of organizational networks
-
-
Procera new data intrcepting solution meets CALEA new requirement
What with the firestorm over the NSA domestic eavesdroping campaign, broadband providers have a 14 May deadline to allow law enforcement agencies to intercept and capture suspicious data transmission without compromising the privacy of innocent cstomers; a California company comes up with a solution
-
-
Hackers use brokers to sell software vulnerabilities
Although programs such as ZDI and VCP are popular, hackers can earn ten times the bounty by going through SNOSoft; significant flaw research can earn as much as $120,000; smart disclosure falls by the wayside
-
-
-
Nuance and Appligent team up to secure PDFs
Converting text documents into PDF can open the door to determined thieves; safely redacting information at issue; new add-on software securely scrubs files for lists of redacted words and phrases
-
-
IBM predicts rise in security threats in 2007
Newly released Vista operating system a ripe target for malicious hackers; fuzzer attacks demonstrate a growing sophistication among the black hat set; IBM’s Internet Security System’s X Force Team pessimistic about the future
-
-
Leading data security companies form payment card securty alliance
Despite all the press on data security breaches and the corporate and personal costs which these breaches entail, there is still only limited awareness of the PCI data security standards; eight leading data security companies form an alliance to change that
-
-
NIST opens competition to improve SHA-1 encryption standard
Recent efforts by Chinese researchers show that decades-old encryption system is increasingly vulnerable; competition is open to all, and winning bid will support 224-, 256-, 384- and 512-bit key encryption, with a maximum message length of at least 264 bits
-
-
-
Yoggie Security Systems raises $1 million
Innovative data protection company offers network security for mobile devices: Yoggie Gatekeeper physically isolates laptops from incoming Internet threats; if an attack is successful, Yoggie Gatekeeper is hit first and will not allow further damage to the laptop
-
-
IT spending worldwide to rise to $1.48 trillion by 2010
More and more is being spent on IT: In 2006 organizations and consumers spent $1.16 trillion, and during the next thee years this number will grow at a CAGR of 6.3 percent
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.