Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure protection

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Top 10 rules for combating cyber attacks

    Califonira-based security specialist offers useful rules for protecting the control systems of critical infrastructure and industrial facilities fro maliciuos intrusion

    • Read more
  • Floridians believe global warming will have dangerous impacts on the state

    Florida Residents want government to do more to address climate change; new survey of Floridians finds that most are convinced that global warming is happening now and that more should be done by key leaders to help Florida deal with climate change

    • Read more
  • Pipe inspecting robot

    Robot able to climb vertically in gas, water, and oil pipes, detecting leaks and monitoring conditions as it moves along

    • Read more
  • TSA launches news airport airside and perimeter security

    Billions of dollars have been invested in — and strict regulations promulgated for — passenger and baggage screening to prevent explosives from being taken on board; very little money has been invested in and no specific mandates imposed regarding airport perimeter security; TSA is changing this — and also takes the next essential step: coordination among the different money bodies involved in airport perimeter security

    • Read more
  • New Trojan targets Australian business bankers

    A systematic phishing campaign has been targeting Aussie financial institutions; a Trojan masked as a bank’s security update proceeds to launch a multi-staged attack, looking for not just usernames and passwords, but chat room credentials, secure downloads, and anything the attackers believe may be useful

    • Read more
  • Lower Mississippi River region braces for major flood

    Floodwaters are projected to crest at St. Louis at 38 feet on 22 or 23 June, marking the eleventh time since the Civil War that St. Louis has reached that flood stage; during the flood of 1993 waters at St. Louis crested at 49.6 feet

    • Read more
  • Assessing landslide risk

    Researchers develop new technique for assessing areas most at risk from landslides

    • Read more
  • Royal Mint issues urgent call for disaster recovery system

    Tender comes after critical review warns about inadequate contingency plans

    • Read more
  • Experts: Surprise quake shows Japan's vulnerability

    Saturday’s 7.2 magnitude quake was the most powerful to strike inland Japan in eight years; experts say the Big One may hit anywhere in the country, in a repeat of the 1923 Great Kanto Earthquake which left 142,807 people dead

    • Read more
  • Security hole exposes utilities to Internet attack

    Supervisory control and data acquisition (SCADA) systems remotely manage computers that control machinery, including water supply valves, industrial baking equipment, and security systems at nuclear power plants; security vulnerability is discovered in SCADA — and patched, but other vulnerabilities may remain

    • Read more
  • Cyber mishap causes nuclear power plant shutdown

    Worries about critical infrastructure vulnerabilities: The move to SCADA systems boosts efficiency at utilities because it allows workers to operate equipment remotely, but experts say it also exposes these once-closed systems to cyber attacks

    • Read more
  • Top ten rules for IT security

    Uniloc offers ten useful rules to keep the organization’s networks safe from intruders and hackers;

    • Read more
  • Flood protection call for utilities

    Twelve months after the devastating U.K. floods a government agency says much more must be done to tackle the vulnerability of buildings such as power stations and hospitals to flooding

    • Read more
  • Increasing attacks on oil infrastructure in Nigeria

    Rebels in the Nigerian Delta are increasing their attacks on the country’s oil infrastructure — and lately have been targeting sea-based targets auch as tankers and oil rigs

    • Read more
  • Killing Internet worms dead

    Internet worms flood the Internet with junk traffic, and at their most benign, they overload computer networks and shut them down; Buckeyes researchers find new way to combat worms

    • Read more
  • « first
  • ‹ previous
  • …
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • …
  • next ›
  • last »

More headlines

  • Israel and US government agencies announced the BIRD Cyber Program, an investment of roughly $4M in projects to enhance the cyber resilience of critical infrastructure
  • House Bipartisan Legislation Proposes to Categorize Space as Critical Infrastructure
  • NASA Shows What 30 Years of Rising Seas Feels Like in Chilling New Animation
  • Lawmakers suggest ‘radical transparency’ as key to shoring up US cyber posture
  • What Should the Government Do in 2023 to Fill its Cyber Workforce Shortage?
  • CISA’s Wales says industry engagement on incident reporting rule will be robust, meet expectations
  • Securing the U.S. Electricity Grid from Cyberattacks
  • Cybersecurity Profile for the Hybrid Satellite Networks (HSN) Cybersecurity: Draft Annotated Outline
  • $3 billion for coastal and climate resilience funding
  • DHS Awards $9.8M for Small Businesses to Develop Security Technology Prototypes
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Training Students to Succeed in the “Fourth Industrial Revolution”

    Transformational changes are already underway in the manufacturing industry as technological advancements, such as artificial intelligence (AI) and smart devices from the “fourth industrial revolution” or Industry 4.0., inspire a digital-first approach to engineering. University of Missouri researchers are using a $1 million grant to support the development of an Industry 4.0 lab, training engineering students for the future of digitization in manufacturing.

    • Read more
  • Climate Change and U.S. Property Insurance: A Stormy Mix

    Accelerating risks and damage from climate change are spurring private insurers in the United States to limit coverage in a growing number of areas, thus imposing mounting stress on local communities and straining the country’s overall economic health.

    • Read more
  • Sediment Movement During Hurricane Harvey Could Negatively Impact Future Flooding

    Enormous amounts of sediment, or sand and mud, flowed through Houston waterways during Hurricane Harvey in 2017, due in part to modifications made by humans to bayous, rivers and streams over the past century. Harvey was the largest rainfall event in U.S. history, and it moved 27 million cubic meters of sediment, or 16 Astrodomes, through Houston waterways and reservoirs. This could seriously impact future flooding events and be costly to the City of Houston.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies