-
Louisville offers critical infrastructure course
Three-day course is targeted toward security architects, security system designers, project managers and security directors, but does not grant credit toward a degree
-
-
Investigative Services Agencies may buy Intrepid Defense & Security Systems
Negotiations are underway, as ISA tries to expand beyond corporate investigation and risk management into the homeland security market; Intrepid’s LifeVision3D —capable of providing 3D images of autombile undercarriages as easily as it can IEDs — would help ISA leap ahead
-
-
Communication security specialist KoolSpan raises $6.5 million
it is a good time to be in the communication security business, and Security Growth Partners and New York Angels give the company with innovative technology a boost
-
-
DHS inspector general 2007 agenda to focus on IT procurement
Four audits of laptop security, include one for OIG itself, are planned; SBInet to receive particular scrutiny; U.S. Citizenship and Immigration Services’ IT modernization, and the Coast Guard’s enterprise architecture implementation among other programs scheduled for review
-
-
Universal Detection Technology offers HAZMAT planning DVD
Known for its BSM-2000 spore detection system, UDT adds to its library of emergency planning resources
-
-
Cisco survey finds federal executives confident of security efforts
Decision-makers spending more time with manadated security requirements than in recent years; half believe software automation tools will be dominant in the near future; the possibility of reduced operations and security delivery due to security breaches are main areas of concerns
-
-
epcSolutions solves the tailgating problem
Company’s Tetragate software combines video, iris scans, and RFID to prevent unauthorized entry by piggybackers; system counts the number of people near an entry point before and after card authorization; “any asset, one network” approach allows objects to be tagged to a person, thereby preventing theft
-
-
Navy scientists use minute manufacturing differences to detect counterfeit IDs
Approach relies in variation among transistors and wires that make up compuuter chips; two may work in the same way, but differences in threshold voltages make all the difference in detecting a fake
-
-
-
-
ManTech spins-out NetWitness division to private investors
Company will retain a share in the company while hoping its new freedom will spur on the creativity needed to dominate the network forensics market; financial terms remain secret
-
-
IBM anounces Clipped Tag technology for retail RFID
Customers nervous about surveillance can cut off a portion of the tag, thereby restricting the range to a few inches; system maximizes the utility of RFID for check-out management while respecting privacy; remaining RFID range permits product returns
-
-
IDC says Middle East IT security market is booming
With $4.7 billion in spending in 2005 alone, analysts predict 15 percent annual growth through 2009; Dubai leads the way, and prepares for the massive GITEX 2006 trade show and conference
-
-
Vigilon opens operation center in Chicago
The State of Illinois is actively seeking homeland security and business continuity companies; the latest to embrace the Windy City is Israeli enterprise security specialist Vigilon, which opens an operation center in Chicago
-
-
DoD lays out 2008 IT security priorities
Redteaming — modelling the enemy’s thought process — leads the way when it comes to defending communications lines; biometric control of military bases a major focus; other priorities include technologies to track terrorists and predict social outcomes of military engagement
-
More headlines
The long view
Emerging Threats to the U.S. Financial System
In early 2021, a freewheeling, freethinking group of investors on Reddit plowed their money into GameStop, a video game retailer that several big hedge funds had bet against. The stock price shot up, some people made millions—and, to the delight of those on Reddit, the hedge funds had some very bad days. Researchers saw the GameStop story as a cautionary tale. If investors on Reddit could work together to move the markets like that, what could an adversary like China do?
No Power, No Operator, No Problem: Simulating Nuclear Reactors to Explore Next-Generation Nuclear Safety Systems
To create safe and efficient nuclear reactors, designers and regulators need reliable data consistent with real-world observation. Data generated at the facility validates computational models and guides the design of nuclear reactors.
Despite Recent Water Supply Improvement, More Cuts Expected for Colorado River, Feds Say
After Lake Mead hit an all-time low two years ago, the Colorado River’s water supply is in a much better position this summer, but it hasn’t improved enough to prevent further cuts this year.