-
Better protection against wireless leaks of information
With more and more sensitive government and corporate information being transmitted wirelessly, there is a growing need to thwart and mitigate the unauthorized wireless leaking of information; A California company has something to offer
-
-
Hackers ply their trade for financial gain
Hackers used to be introverted, angry young men with acne who felt misunderstood and sought compensation in beating the system; many of them are still young and angry, but they have become more money-oriented in their activities
-
-
Promisec, corporate security specialist, raises $2.4 million
More damage is done to companies by disgruntled or malicious employees, and Promisec offers a solution which may alleviate this particular problem
-
-
L-3 selects AirWalk for CDMA-based IP-RAN
Communication during disasters is key to effective response, and L-3 chooses a developer of IP radio access networks for CDMA wireless voice and data networks
-
-
-
-
-
-
-
-
-
-
Cyber Storm drill under way
Nation-wide (indeed, international) cybersecurity drill under way
-
-
State of federal-state cybersecurity cooperation unsatisfactory
There is a lot of talk about the need for greater federal-state cooperation on cyber security, but much is still to be done
-
-
More headlines
The long view
Hacking the Grid: How Digital Sabotage Turns Infrastructure into a Weapon
The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. The blackout was the result of a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.
Entity Resolution: The Security Technology You Probably Haven’t Heard Of
The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.
