-
New safety rule changes landscape for chemical industry -- and others
DHS’s new Chemical Facility Anti-Terrorism Standards are broadly applicable to American industry
-
-
Magal in $8 million contract to provide perimeter protection
Magal’s Perimitrax buried cable intrusion detection system will be deployed around several public facilities in an unnamed country in west Asia
-
-
Making disaster preparedness more effective
Emergency and preparedness experts emphasize that a key to effective response is avoiding duplication of efforts among different agencies and levels of government
-
-
Attacks on Mexico's oil, natural gas infrastructure increase
Mexico has a 30,000-mile network of energy pipelines; the network is exceedingly vulnerable to attacks; a shadowy terrorist group takes advantage, injuring the country’s economy
-
-
Growing worries, debates about likelihhod, effects of strategic cyber attack
The spring cyber attacks on Estonia offer an illustration of what strategic cyber warfare may look like; experts debate capabilities, motives for such an attack
-
-
Natural gas pipelines sabotaged by terrorists in Mexico
Leftist terrorists escalate their bombing campaign against Mexican gas and oil infrastructure
-
-
Vuance in $13.8m agreement to secure European airport
Israeli company to build perimeter security and border control systems at a European international airport
-
-
IT security group concerned over VoIP safety
Leading member of Jericho Forum criticizes the security of VoIP technology after researchers reveal that it was possible to eavesdrop on VoIP conversations
-
-
NIST offers power grid calibration service
Terms like “phasor and “sinor” are not taken from a Star Trek episode: NIST offers a phasor-based service to help US. grid operators better calibrate surges
-
-
Encryption specialist Voltage Security reports good results
The growing popularity of one of the company’s products — Voltage Security Network — proves the viability of security-as-a-service business model
-
-
Cumbersome federal acquisition rules an obstacle to IT flexibility
Cumbersome acquisition rules designed for building weapons systems and computing platforms are hampering adoption of rapidly evolving information technology networks
-
-
Messaging- and storage compliance technologies on the rise
More and more organizations deploy solutions which govern what employees can or cannot put into e-mails, instant messages, Web postings, and offline documents; trend moving beyond tightly regulated industries such as health care and financial services
-
-
Corpus Christi's port replaces private security guards
Texas port had an idea: Save money by hiring contract security guards; trouble is, guards showed up drunk, slept on the job, and more; port now rethinks policy
-
-
No mystery about Minneapolis bruidge collapse
Expert says truss-arch bridges are like a linked chain: If one link fails, the entire chain collapses; Minneapolis’s I-35W bridge was such a bridge, in which “Local damage immediately means total collapse”
-
-
APCO: 700 MHz proposal offers voice potential
The LMR is not dead yet: The FCC has approved dedicationg a portion of the 700 MHz band to public safety, trouble is, many in public-safety communications have been wary of IP-based voice technologies; APCO says the band can accommodate voice
-