Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure protection

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • CYBERSECURITYA Quarter of World's Internet Users Rely on Infrastructure Highly Vulnerable to Attack

    About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South.

    • Read more
  • FOOD SECURITYFood Production Vulnerable to Cyberattacks

    Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.

    • Read more
  • COASTAL CHALLANGESChallenges to Tidal Flats Pose Risks to 41M Americans Living in Coastal Counties

    About 29 percent of the United States’ population live in coastline counties – more than 41 million are in Atlantic counties. This high population density poses a critical challenge to sustainable developments in coastal areas.

    • Read more
  • CRITICAL INFRASTRUCTURES&T Hackathon: Thwarting Emerging Threats to Critical Infrastructure

    Threats against the U.S. critical infrastructure are not new—physical threats and natural disasters have challenged the U.S. critical infrastructure and their support systems time and time again. But the rapid development of new information and communication technologies, and their inevitable integration the into the U.S. critical infrastructure, bring with them the possibility of digital attacks and other new challenges that the United States must be ready to face.

    • Read more
  • CRITICAL TECHNOLOGIESStrengthen Advanced Manufacturing for Critical and Emerging Technologies

    NIST has awarded a total of $2.08 million to seven organizations in six states to develop manufacturing technology roadmaps to strengthen U.S. innovation and productivity. Each award will fund projects for up to 18 months to address national priorities such as manufacturing of critical infrastructure, communication, and transformative approaches and technologies in construction.

    • Read more
  • CRITICAL MINERALSThe "Rock-to-Metal Ratio" of Critical Minerals

    A new metric to quantify the amount of waste rock generated by mining for minerals essential to 21st century society has been created by the U.S. Geological Survey and Apple.

    • Read more
  • CYBERSECURITYHow Destructive Is a DDoS Cyberattack?

    By Esteban Pardo

    Last weekend, Russian hackers attacked several German government websites. These cyberattacks were seemingly harmless, much to the relief of the authorities. But many others are not so lucky.

    • Read more
  • CYBERSECURITYUndetected and Dormant: Managing Australia’s Software Security Threat

    By Sarah Sloan

    At the same time as software has become integral to our prosperity and national security, attacks on software supply chains are on the rise. Software supply chain attacks are popular, can have a big impact and are used to great effect by a range of cyber adversaries.

    • Read more
  • WILDFIRESWildfires Are Still Catching Us Off-Guard. Congress’ Plan to Fix That Isn’t Going Anywhere.

    By Chad Small

    Last year, during a Congressional hearing on the state of wildfire research, researchers and fire managers said that coordination among federal agencies to improve wildfire research would be tremendously helpful to prepare for future fires. But the proposal to connect federal research agencies and improve wildfire research crashed and burned.

    • Read more
  • INFRASTRUCTURE PROTECTIONBoosting Efforts to Predict Harmful Solar Weather Events

    When big blasts of energy from the sun envelop the Earth, they can very strong: a 2015 event so weakened Earth’s protective magnetic field that it penetrated to the atmosphere, posing a threat to everything from circling space station astronauts to delicate electronics and communication systems.

    • Read more
  • WILDFIRESGuidance for Holistic Home and Community Wildfire Protection

    Once they have a foothold, severe wildfires can quickly overwhelm a community, particularly one that is densely packed. To shield houses against such a fierce threat, a thorough defense is key.

    • Read more
  • WILDFIRESHow Our Bushfire-Proof House Design Could Help People Flee Rather Than Risk Fighting the Flames

    By Deborah Ascher Barnstone

    Building houses better at withstanding the impacts of climate change is one way we can protect ourselves in the face of future catastrophic conditions. I’m part of a research team that developed a novel, bushfire-resistant house design, which won an international award last month.

    • Read more
  • CYBERSECURITYA Cyber Security Intrusion Detection System for Industrial Control Systems

    Researchers have developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems.

    • Read more
  • EARTHQUAKESRisk Models Overlook an Important Element

    Earthquakes themselves affect the movement of Earth’s tectonic plates, which in turn could impact on future earthquakes, according to new research. This new knowledge should be incorporated in computer models used to gauge earthquake risk, according to the researchers behind the study.

    • Read more
  • EARTHQUAKESRisk Models Overlook an Important Element

    Earthquakes themselves affect the movement of Earth’s tectonic plates, which in turn could impact on future earthquakes, according to new research. This new knowledge should be incorporated in computer models used to gauge earthquake risk, according to the researchers behind the study.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • 100 day cybersecurity resilience plan for water and wastewater sector
  • Water, schools, among major concerns for Utah earthquake commission
  • MyShake early warning app ready for Seattle earthquake alerts
  • What CISA Incident Response Playbooks Mean for Your Organization
  • SolarWinds hackers targeted Autodesk in latest confirmed fallout from cyber-espionage campaign
  • Computer scientist warns global internet is not prepared for a large solar storm
  • TSA Issues Second Security Directive for "Critical" Pipelines and LNG Facilities and Plans to Revise Pipeline Cybersecurity Guidelines
  • What TSA's New Cybersecurity Standards Mean For Pipelines
  • Using SOCs and Cybersecurity Hubs to Prioritize Security Operations in a Critical Era
  • Senate includes over $1.9 billion for cybersecurity in infrastructure bill
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies