Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure protection

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Universal Detection Technology offers HAZMAT planning DVD

    Known for its BSM-2000 spore detection system, UDT adds to its library of emergency planning resources

    • Read more
  • epcSolutions solves the tailgating problem

    Company’s Tetragate software combines video, iris scans, and RFID to prevent unauthorized entry by piggybackers; system counts the number of people near an entry point before and after card authorization; “any asset, one network” approach allows objects to be tagged to a person, thereby preventing theft

    • Read more
  • Magal

    • Read more
  • Garda purchases Securite et Protection Secpro

    Deal just the latest in major acquisitions for the Canadian firm and follows on purchase of Vance; Securite a major Quebec-based provider of guard services

    • Read more
  • Smiths Detection moves forward with Tunnel of Truth

    Scheduled for deployment at the 2012 London Olympics, the system incorporates a slew of automated measures to detect explosives and weapons; scheme resembles GE’s Checkpoint of the Future, including the use of the much-maligned puffer machines

    • Read more
  • ECSI wraps up SPR contract and signs a few more

    $8.5 million deal to protect Strategic Petroleum Reserve sites is almost complete; ECSI, a leader in energy infrastructure security, signs with liquid natural gas facilities in Texas and makes a classified agreement with one in South Korea

    • Read more
  • BT acquires Counterpane Internet Security

    IT security is a growing problem – and a growing business; BT has many corporate customers, and to offer these customers a more robust managed security service with enhanced auditing and reporting capabilities, it has just acquired a California IT security outsourcing specialist

    • Read more
  • The state of U.K. critical infrastructure is not good

    Looking for investment opportunities? Look no farther than the U.K. critical infrastructure; a just-published experts report highlights that many weaknesses that need to be addressed, the many problems that must be resolved

    • Read more
  • New business opportunities in radiation detection technologies

    The North Korea nuclear test, and the inexorable march of Iran toward acquiring nuclear weapons, increase the risks of nuclear weapon proliferation; there are thus many opportunities in developing new radiation detection technologies

    • Read more
  • Security officials worry about Google Earth

    Terrorists may use satellite images to identify targets and plan attacks, experts say; concern is global as Dutch, Russians, and others worry; democratizing Internet spreads access to high resolution photographs; rogue nations the big winners here

    • Read more
  • Attensity partners with IBM

    Companies, both leaders in managing unruly computer files, come together to improve the IBM Information Server; for Attensity, the deal is another success among many; for IBM, a way to attract customers interested in pulling relational information out of unstructured data

    • Read more
  • Terra Firma chooses ControlGuard’s endpoint security solution

    As the size of the mobile work force increases, with more and more employees carrying and using portable devices, the security risks a company faces increase apace; how does a corporation enjoy the benefits of greater efficiency and timeliness which mobility brings, without at the same time exposing itself to detrimental risks? The solution is endpoint security, and a leading international private equity firm has just selected an endpoint security solution from ControlGuard

    • Read more
  • Cory Lidle's death recalls similar historical events

    Small planes crash into buildings far more often than one would expect; episodes at the Empire State Building, and in Tampa and Milan, show danger

    • Read more
  • University of Colorado announces first-in-nation PhD program

    Degree to be offered as early as the fall, pending $1.9 million in federal funding; public policy program will focus on infrastructure threats

    • Read more
  • Indiana receives $1.2 million for lake and river security

    Money will be used to purchase powerboats, the trucks to tow them, thermo-imaging devices, and side-scanning sonar units

    • Read more
  • « first
  • ‹ previous
  • …
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • …
  • next ›
  • last »

More headlines

  • DHS Awards $9.8M for Small Businesses to Develop Security Technology Prototypes
  • Flood sensors give Montgomery Co. new way to track water levels remotely
  • 100 day cybersecurity resilience plan for water and wastewater sector
  • Water, schools, among major concerns for Utah earthquake commission
  • MyShake early warning app ready for Seattle earthquake alerts
  • What CISA Incident Response Playbooks Mean for Your Organization
  • SolarWinds hackers targeted Autodesk in latest confirmed fallout from cyber-espionage campaign
  • Computer scientist warns global internet is not prepared for a large solar storm
  • TSA Issues Second Security Directive for "Critical" Pipelines and LNG Facilities and Plans to Revise Pipeline Cybersecurity Guidelines
  • What TSA's New Cybersecurity Standards Mean For Pipelines
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Preparing National Security Officials for the Challenges of AI

    Artificial intelligence (AI) is one of several rapidly emerging technologies that promise to disrupt not only multiple sectors of the U.S. economy but also the manner in which the U.S. government carries out its foundational responsibility to protect national security consistent with the rule of law and constitutional values. Steve Bunnell writes that “The United States’ national security apparatus is not known for nimbleness, nor is the law that governs it. When it comes to AI, the risk is not just that our generals will fight tomorrow’s war with yesterday’s strategy but also that the United States will lack the legal and policy guardrails that are essential to a lawful, accountable, and ethical protection of the nation’s security.”

    • Read more
  • Food Production Vulnerable to Cyberattacks

    Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.

    • Read more
  • The "Rock-to-Metal Ratio" of Critical Minerals

    A new metric to quantify the amount of waste rock generated by mining for minerals essential to 21st century society has been created by the U.S. Geological Survey and Apple.

    • Read more
  • Challenges to Tidal Flats Pose Risks to 41M Americans Living in Coastal Counties

    About 29 percent of the United States’ population live in coastline counties – more than 41 million are in Atlantic counties. This high population density poses a critical challenge to sustainable developments in coastal areas.

    • Read more
  • Boosting Efforts to Predict Harmful Solar Weather Events

    When big blasts of energy from the sun envelop the Earth, they can very strong: a 2015 event so weakened Earth’s protective magnetic field that it penetrated to the atmosphere, posing a threat to everything from circling space station astronauts to delicate electronics and communication systems.

    • Read more
  • Mitigating Flood Disasters

    Engineers have proposed a flood control measure which recommends designing permeable pavements to specifically suit local rainfall and soil conditions and reduce flood impacts.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies