-
How to pay for greater chemical plant safety
Critics point to the price tag of the chemical plant safety measure as a reason why it should not be imposed on the chemical industry; they are wrong: Meaningful safety standards should be imposed on chemical plants, but since it is a public good, the taxpayers — not the industry alone — should shoulder the cost
-
-
Boeing successfully tests TSAT
As worries about China’s growing anti-satellite warfare capabilities grow, Boeing and partner companies successfully test a system for encrypted communication with satellites
-
-
Uncertainties about nuclear waste storage
The waste created in the production of U.S. nuclear weapons is buried in Hanford, Washington; there is a growing uncertainty about the subsurface paths nuclear contaminants take, where they travel, and how fast
-
-
Top Internet security risks of 2007 revealed today
This year’s SANS Top 20 illuminates two new attack targets that criminals have chosen to exploit and the older targets where attackers have significantly raised the stakes
-
-
Security software may be posing security risks
Security maven Thierry Zoller says that file-parsing bugs in security software could become a big problem: Increasing your use of antivirus software only increases the chances that you could be successfully attacked
-
-
Talk of nuclear power renaissance not matched by action
The rising price of oil and growing concerns about the environment have fueled the notion that nuclear power will soon enjoy a renaissance; new study shows that facts on the ground tell a different story
-
-
Pay attention to the human element in IT security
As far as information security is concerned, even the world’s best technological solution cannot replace a piece of paper –- the company security policy
-
-
Organizational security: Alion takes stock and offer remedies
Organizations which take their security seriously want to evaluate continuously their security situation and security policies; often they also must see that they are in compliance with government security mandates; serious organizations should take a look at Alion’s CounterMeasures
-
-
Canada's increasingly worried about Arctic vulnerabilities
The Arctic has immense oil reserves and mineral wealth, but Canada has been slow to protect its northern sovereignty; this becomes even more important as receding Arctic ice makes Canada’s northern frontier more accessible to uninvited guests
-
-
China, India to drive global energy growth
If current energy consumption trends continue, global energy consumption could increase well over 50 percent by 2030; global carbon dioxide emissions from energy use would increase by 57 percent
-
-
2007 Maritime Security Expo: Security challenges, business opportunities
The U.S. maritime transportation system — ports, ships, warehouses, access roads — is vast and sprawling; securing this system offers many opportunities for security-related businesses for two reasons: It is essential to the welfare and national security of the United States, and many of its nodes are vulnerable to attack and disruption
-
-
Corporate e-mail authentication battle royal: IP-based vs. signature-based
There are two categorical approaches to corporate e-mail security: Path- or IP-based focuses on where the message originated and evaluates the network path traversed by the e-mail; cryptographic methods look at who sent the message
-
-
Penn State researchers increase data transmission rate of copper cables
Nittany Lions electrical engineers show it is possible to increase the data transmission of Category-7 copper cables used to connect computers to each other and the Internet
-
-
Chinese espionage "single greatest risk" to U.S. technology sector
China’s disregard of intellectual property law is a matter of record; European governments are increasingly alarmed by Chinese intelligence engaging in massive industrial espionage campaign on behalf of Chinese companies; now, congressional panel warns of dire consequences to U.S. technology sector from sustained, sophisticated Chinese espionage campaign
-
-
U.K. uses new law to force hand-over of encryption keys
In October 2007 Parliament passed a law allowing authorities to force people to hand over encryption keys to data stored on their private computers; an animal rights activist is among first to be ordered to hand over encryption keys for her computer, which was seized in May
-
More headlines
The long view
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse
The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.