-
DHS searches for safer bridges
DHS, Army Corps of Engineers look for ways to make bridges more terror-resistant; advances in steel and reinforced concrete to be explored
-
-
New safety rule changes landscape for chemical industry -- and others
DHS’s new Chemical Facility Anti-Terrorism Standards are broadly applicable to American industry
-
-
Magal in $8 million contract to provide perimeter protection
Magal’s Perimitrax buried cable intrusion detection system will be deployed around several public facilities in an unnamed country in west Asia
-
-
Making disaster preparedness more effective
Emergency and preparedness experts emphasize that a key to effective response is avoiding duplication of efforts among different agencies and levels of government
-
-
Attacks on Mexico's oil, natural gas infrastructure increase
Mexico has a 30,000-mile network of energy pipelines; the network is exceedingly vulnerable to attacks; a shadowy terrorist group takes advantage, injuring the country’s economy
-
-
PC users face increasingly complex and dangerous cyber threats
Authrotative cyber threat report says that targeted identity theft, emerging risks associated with online gaming, a doubling of malware exploits, and new software vulnerabilities are but some of the many problems PC users will face in the coming months
-
-
Growing worries, debates about likelihhod, effects of strategic cyber attack
The spring cyber attacks on Estonia offer an illustration of what strategic cyber warfare may look like; experts debate capabilities, motives for such an attack
-
-
Natural gas pipelines sabotaged by terrorists in Mexico
Leftist terrorists escalate their bombing campaign against Mexican gas and oil infrastructure
-
-
Chinese military hacked into Pentagon
China improves its cyber warfare capabilities; massive penetration of Pentagon computers in June — and Chinese easy penetration of the networks of defense contactors and think-tanks would allow China not only to gather information, but also disrupt operations
-
-
Vuance in $13.8m agreement to secure European airport
Israeli company to build perimeter security and border control systems at a European international airport
-
-
Mobile torrents are a cell phone security nightmare
Mobile torrents represent incredible access to mobile applications and other content, but for mobile security providers mobile torrents will be a security nightmare; for mobile security providers mobile torrents will be a security nightmare
-
-
IT security group concerned over VoIP safety
Leading member of Jericho Forum criticizes the security of VoIP technology after researchers reveal that it was possible to eavesdrop on VoIP conversations
-
-
Federal CISO: No contradiction between mobility and security
The need to prepare for disaster and the growing availability of technology have combined to promote telework — but is there a contradiction between mobility and security? New study says “no”
-
-
Lessons of Estonia: Ten steps to prepare for cyberwar
Two months ago Estonia came under a coordinated cyber attack; experts say the attack — and Estonia’s response — tell us how IT executives can prepare for the worst
-
-
Corporations demand enhanced cybersecurity
Chief information security officers want the high-tech industry to offer better security tools for their companies; these CISO have formed the Jericho Forum better to advance their case
-