-
Systems integrator Adesta is making a bigger impression
Adesta is a versatile and innovative systems integrator specializing in the construction and maintenance of stand-alone or integrated communication networks and electronic security systems
-
-
Grisoft acquires Exploit Prevention Labs
Exploit Prevention Labs specializes in safe surfing technology that protects Internet users against malicious web sites and drive-by downloaded exploits; Grisoft expands it Web security offerings
-
-
New York opposes extending Indian Point license
Indian Point nuclear plants in Westchester County are surrounded by 20 million people within a 50-mile radius, more than any other reactor in the country; plants’ operator applied for a 20-year extension license, but the State of New York says plants pose too much risk and should be shut down
-
-
FLIR Systems received $2 million contracts to boost airport security
Thermal imaging specialist finds its cameras in demand at U.S. airports; cameras are suitable for securing the long perimeters typically associated with major airports
-
-
How to secure the new data center
Virtualization is disruptive, and it changes the rules for how companies secure — or, rather, ought to secure — their data and their computing infrastructure
-
-
Bulgaria to build the first Russian-designed nuclear reactor in the EU
Bulgaria will be the first EU country to build a nuclear power plant based on Russian design; the plant will be built at a site deemed unsafe two decades ago because it was prone to earthquakes
-
-
AFIT team wins annual DOD Cyber Crime Center Challenge
Four graduate students from the Air Force Institute of Technology win highly competitive annual DOD Cyber Crime Center Challenge; the winning team used innovative techniques to crack passwords; repair damaged media such as CDs, DVDs, and a thumb drive; extract hidden information from audio files; and dissect digitally altered photos
-
-
Defense panel worries about foreign software development
The U.S. Department of Defense and other government agencies rely more and more on software developed outside the U.S.; a Defense Science Board task force warns that this “creates a rich opportunity to damage or destroy elements of the [U.S.] warfighter’s capability”
-
-
McAfee sees wave of international cyber crime
International cyber crime and espionage are on the rise, and will likely pose the most significant security threats in 2008; cyber attacks have evolved into well-funded and complex crime organizations. Governments in 120 countries — particularly China — and other allied groups are using the Internet for cyber espionage and attacks
-
-
SANS Top 20: Some IT risks did not materialize, others more severe
SANS Top 20 IT risks (this year, the list contained only 18 of them) show that: Client-side threats are on the rise (if for nothing else, than owing to the sheer attention vendors paid to server-side risks); Web application threats are bigger than ever (50 percent of the 4,396 vulnerabilities report by SANS between November 2006 and October 2007 were Web application flaws); mobile, voice-over-IP (VoIP), IPv6, and zero-day threats were not as big as expected
-
-
Cities worry about toxic substances in freight cars
Water treatment facilities in Baltimore no longer use chlorine, but city residents are still exposed to risk because trains carrying the toxic substance to facilities elsewhere go through the city; city officials want to change this situation
-
-
Europeans install radiation detectors as U.S. question detectors' efficacy
U.S. legislators raise questions about DHS’s $1.4 billion program which aims to deploy nuclear radiation detectors in U.S. ports; GAO raises questions about test methodology of latest technology; Europeans, though forge ahead with port deployment
-
-
How real is the nuclear threat for the United States?
Graham Allison: “Based on current trends, a nuclear terrorist attack on the United States is more likely than not in the decade ahead”
-
-
Acoustic sensors to protect borders, critical infrastructure
Two British companies offer an intriguing border, perimeter, and critical infrastructure protection solution: Sensors, using optical time domain reflectometry (OTDR), continuously monitor the length of existing or installed cable to detect, locate, and categorize security breaches every 10 meters over a 40 km length of optical fiber
-
-
How to pay for greater chemical plant safety
Critics point to the price tag of the chemical plant safety measure as a reason why it should not be imposed on the chemical industry; they are wrong: Meaningful safety standards should be imposed on chemical plants, but since it is a public good, the taxpayers — not the industry alone — should shoulder the cost
-
More headlines
The long view
Falling Space Debris: How High Is the Risk I'll Get Hit?
An International Space Station battery fell back to Earth and, luckily, splashed down harmlessly in the Atlantic. Should we have worried? Space debris reenters our atmosphere every week.
Using Drone Swarms to Fight Forest Fires
Forest fires are becoming increasingly catastrophic across the world, accelerated by climate change. Researchers are using multiple swarms of drones to tackle natural disasters like forest fires.
Strengthening the Grid’s ‘Backbone’ with Hydropower
Argonne-led studies investigate how hydropower could help add more clean energy to the grid, how it generates value as grids add more renewable energy, and how liner technology can improve hydropower efficiency.
LNG Exports Have Had No Impact on Domestic Energy Costs: Analysis
U.S. liquified natural gas (LNG) exports have not had any sustained and significant direct impact on U.S. natural gas prices and have, in fact, spurred production and productivity gains, which contribute to downward pressure on domestic prices.