• Rod Beckstrom to head NCSS

    DHS taps Silicon Valley serial entrepreneur Rod Beckstrom to head new cyber security outfit; Beckstrom’s task is to secure the government IT systems

  • Warming could radically change Lake Tahoe in 10 years

    Global warming will irreversibly alter water circulation in Lake Tahoe, changing conditions for for fish and plants; effect on the Tahoe Basin as an international vacation destination unclear

  • Intelligent wireless networks promoted by European consortium

    The proliferation of wireless communication-enabled embedded systems will have significant effects in areas from emergency management to critical infrastructure protection to healthcare and traffic control; European consortium to promote idea

  • Breakthrough: Dramatic increase in thermoelectric efficiency achieved

    Two hundred years ago scientists discovered the thermoelectric effect: Certain materials can convert heat into electricity and vice versa; trouble is, most materials which conduct electricity also conduct heat, so their temperature equalizes quickly; until now: Boston College, MIT researchers solve this vexing problem

  • ICx in contract for specialty radar system for robots

    General Dynamics gives ICx Technologies a follow-on contract for the Mobile Detection Assessment and Response System (MDARS) Intruder Detection Radar Sensor

  • New material captures carbon dioxide

    Georgie Tech researchers developed material which captures CO2 from the chimneys of coal-fired power plants and other generators of the greenhouse gases

  • Debate over data security breach insurance continues

    With more and more stories about data security breaches at major companies with millions of customers, the question arises: Should companies, as part of their business continuity plan, take out data security breach insurance? Industry insiders, analysts offer a range of opinions

  • VigilancePro from OpticVision

    VigilancePro offers organizations protection from both internal and external threats; this endpoint security solution allows organizations to set their security and alert policies; it integrates with existing security systems; and it connects physical and digital security to fill the gaps in existing IT security infrastructures

  • TeleContinuity granted Type II carrier license in Japan

    Japan is earthquake prone, so Japanese companies and organizations are especially interested in business continuity and disaster recovery solutions; one innovative communication continuity solution comes from TeleContinuity, and the prediction here is that the Type II carrier license, and a good distribution agreement with ECOSS Japan, would make the company’s products a success in the not-always-easy-to-penetrate Japanese market

  • Advanced software identifies complex cyber network attacks

    By their very nature networks are highly interdependent and each machine’s overall susceptibility to attack depends on the vulnerabilities of the other machines in the network; new software allows IT managers to address this problem

  • More than 4 million credit, debit cards exposed in security breach

    Supermarket chain Hannaford Bros., with 270 stores nationwide, says that a security breach in its system exposed 4.2 million credit and debit cards; 1,800 cases of fraudulent use already detected

  • Researchers warn that Lake Mead is drying up

    Lake Mead is a key source of water for for millions of people in the southwestern United States; research shows that if current trends — usage, climate change — continue, the lake may dry up by 2021

  • Serious RFID vulnerability discovered

    A group of a Dutch university’s digital security researchers discovers a major security flaw in a popular RFID tag; discovery can have serious commercial and national security implications; as important as the discovery itself was how the researchers handled the situation

  • ORECon raises $24 million

    Innovative U.K. wave energy company raises $24 million in VC investment

  • MI5 seeks powers to trawl records in new terror hunt

    As part of the Brown government’s new counterterrorism strategy, which places emphasis on thwarting a cyber-attack on the United Kingdom, MI5 seeks total access to commuters’ travel records to help them meet the threat