Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Making precast concrete structures safer

    Precast concrete helps builders save time and money, and also increase buildings’ durability; new research aims to make them better able to withstand earthquakes

    • Read more
  • ManTech acquires ETG

    ETG is a privately held and highly specialized company providing computer network operations and computer forensics; in acquiring it, ManTech signals its intent to expand further into the cybersecurity counter-terrorism technology support market

    • Read more
  • Britain "under constant attack in cyberwar"

    The U.K. government warns a cyberwar is being waged against Britain with key computer networks coming under attack every day

    • Read more
  • Earthquakes endanger New York more than previously believed

    A study by a group of prominent seismologists suggests that a pattern of subtle but active faults makes the risk of earthquakes to the New York City area substantially greater than formerly believed; among other things, they say that the controversial Indian Point nuclear power plants, 24 miles north of the city, sit astride the previously unidentified intersection of two active seismic zones

    • Read more
  • NIST 9/11 investigation finds building fires caused collapse

    After three years study, NIST experts say fire caused the collapse of the 47-story World Trade Center building 7; this is the first known instance of fire causing the total collapse of a tall building

    • Read more
  • New three-in-one detection device

    Lawrence Livermore researchers develop a “universal point detection system” which can detect explosive, chemical, and biological agents all at the same time

    • Read more
  • EAGLE task order opportunities

    With the federal fourth quarter underway, vendors are wondering where end-of-year spending will happen; task order vehicles are an obvious place to look because task orders can be competed and awarded quickly; DHS’s EAGLE task order is one example

    • Read more
  • New immunization strategy better in handling epidemics, computer viruses

    New immunization approach fragments the population to be immunized into many connected clusters of equal size; by creating equal-size clusters, doses do not have to be “wasted” on isolating very small clusters, as in the traditional targeted strategy

    • Read more
  • Legal skirmish over Defcon talk shows divide on disclosing security flaws

    Gag order slapped on MIT students who prepared a talk about Boston transit authority security flaw reignites debate over what “responsible disclosure” of security flaw means

    • Read more
  • Indian SMBs will spend $289 million on security related investments this year

    Business in India are becoming more aware of security threats and the need for continuity planning; the top three key trends among India SMBs are UTM (Unified Threat Management), BCS (Business Continuity Solutions), and MSS (Managed Security Services)

    • Read more
  • GSA implements IPv6

    GSA becomes the first civilian agency to implement IPv6; the current IPv4 uses 32-bit addresses, meaning it can offer about 4.3 billion addresses total; IPv6 uses 128-bit addresses, so it can offer an almost unlimited number of addresses — the first step toward achieving fully networked functionality among all electronic devices

    • Read more
  • Pentagon suspends USAF cyber effort

    The growing dependence of governments and militaries on the Internet has led the U.S. Air Force to create a new Cyber Command; the Air Force has now put this effort on hold

    • Read more
  • Who is behind cyber attacks on Georgia?

    Sustained cyber attacks of Georgian official Web sites, attacks which immediately preceded and then accompanied the Russian military action against the former Soviet republic, originated from a “hacker militia” of Russian botnet herders and volunteers

    • Read more
  • Five steps to safer virtual servers

    At the Black Hat conference, HP chief security strategist provided virtualization security advice

    • Read more
  • As the cost of building infrastructure rises, public funds are sought

    The cost of building infrastructure in the United Kingdom continue to rise — lasy year rRaw materials and labor costs have risen by 12.2 percent; more and more public funds are sought

    • Read more
  • « first
  • ‹ previous
  • …
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • AI's thirst for power keeps coal fires burning bright
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • US wastewater tests show bird flu virus limited to areas with farm animals
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Is the nation’s water supply safe from attack?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Nuclear Has Changed. Will the U.S. Change with It?

    Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.

    • Read more
  • Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse

    The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.

    • Read more
  • Exploring the New Nuclear Energy Landscape

    In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies