-
IT is too important to leave to IT specialists
How and why the IT function needs to change its relationship with the business
-
-
Massive IT security breach in Connecticut
Accenture operates CORE-CT, which performs all of Connecticut’s payroll, personnel, purchasing, accounting, inventory, and other functions; it took a copy of the program to demo in Ohio — and the copy was stolen
-
-
Elephant trap for truck-bombs
A truck bomb killed 241 soliders in Beirut in 1983, and they continue to reap their grim harvest in Iraq and Afghanistan; a designer suggests an elephant-trap design as proetction
-
-
DHS searches for safer bridges
DHS, Army Corps of Engineers look for ways to make bridges more terror-resistant; advances in steel and reinforced concrete to be explored
-
-
New safety rule changes landscape for chemical industry -- and others
DHS’s new Chemical Facility Anti-Terrorism Standards are broadly applicable to American industry
-
-
Magal in $8 million contract to provide perimeter protection
Magal’s Perimitrax buried cable intrusion detection system will be deployed around several public facilities in an unnamed country in west Asia
-
-
Making disaster preparedness more effective
Emergency and preparedness experts emphasize that a key to effective response is avoiding duplication of efforts among different agencies and levels of government
-
-
Attacks on Mexico's oil, natural gas infrastructure increase
Mexico has a 30,000-mile network of energy pipelines; the network is exceedingly vulnerable to attacks; a shadowy terrorist group takes advantage, injuring the country’s economy
-
-
PC users face increasingly complex and dangerous cyber threats
Authrotative cyber threat report says that targeted identity theft, emerging risks associated with online gaming, a doubling of malware exploits, and new software vulnerabilities are but some of the many problems PC users will face in the coming months
-
-
Growing worries, debates about likelihhod, effects of strategic cyber attack
The spring cyber attacks on Estonia offer an illustration of what strategic cyber warfare may look like; experts debate capabilities, motives for such an attack
-
-
Natural gas pipelines sabotaged by terrorists in Mexico
Leftist terrorists escalate their bombing campaign against Mexican gas and oil infrastructure
-
-
Chinese military hacked into Pentagon
China improves its cyber warfare capabilities; massive penetration of Pentagon computers in June — and Chinese easy penetration of the networks of defense contactors and think-tanks would allow China not only to gather information, but also disrupt operations
-
-
Vuance in $13.8m agreement to secure European airport
Israeli company to build perimeter security and border control systems at a European international airport
-
-
Mobile torrents are a cell phone security nightmare
Mobile torrents represent incredible access to mobile applications and other content, but for mobile security providers mobile torrents will be a security nightmare; for mobile security providers mobile torrents will be a security nightmare
-
-
IT security group concerned over VoIP safety
Leading member of Jericho Forum criticizes the security of VoIP technology after researchers reveal that it was possible to eavesdrop on VoIP conversations
-
