-
Immunity offers a portable hacking device for penetration testing
Nokia 770 tablet device is intended for companies to conduct their own white hat operations; tester turns on the $3,600 device, sticks it in his pocket, and waits to see whether his local wireless network is exploitable
-
-
Defense Information Systems Agency budgets $959 million for IT security
As DoD prepares to sign a cybersecurity pact with NATO, DISA tries to get its own house in order; $819 million for operations and maintenance and $140 million for procurements; plans to improve defense of SIPRNET, develop a risk management system
-
-
DoD and NATA to sign cybersecurity pact
National Cyber Response Coordination Group sees a great benefit to dealing with a single NATO cybersecurity agency, rather than working bilateralluy with twenty-six nations; Eastern European hackers a major concern
-
-
Javelin finds ID theft on the decline
Survey finds a 12 percent drop in the overall cost of ID theft nationwide; 500,000 fewer victims; teenagers a growing target due to social networking and music sites
-
-
DHS offers infrastructure protection course
It is one thing for a committee of experts to write lengthy and detailed plans on how to protect the nation’s critical infrastructure, and it is another thing to have these plans implemented effectively by thousands of government and private sector organizations; DHS offers a Web-based course which will help the relevant people to do so
-
-
Private sector responsible for infrastructure protection planning
The U.S. government has a role to play in contingency planning for protecting critical infrastructure; security experts and government officials agree, though, that businesses should be self-sufficient when it comes to coping with emergencies; “The government is not going to save you,” said a former DHS official
-
-
Uniform European critical infrastructure protection policy a step closer
It is not easy to fashion a coherent and unfirom critical infrastructure protection policy for an organization with more than a dozen sovereign nation states; the EU is moving a step closer to achieving this goal
-
-
Network security: A practical approach by Ilan Meller
Location-based and time-based measures breach physical and logical security of organizational networks
-
-
Procera new data intrcepting solution meets CALEA new requirement
What with the firestorm over the NSA domestic eavesdroping campaign, broadband providers have a 14 May deadline to allow law enforcement agencies to intercept and capture suspicious data transmission without compromising the privacy of innocent cstomers; a California company comes up with a solution
-
-
Marines in Iraq demand LE System's laser-based crowd control system
Dazzler creates a wall of blinding green light that forces drivers away from senstive areas; while the brass favor a B.E. Meyers-produced device, the troops on the ground prefer LE; safety officials put their foot down
-
-
Hackers use brokers to sell software vulnerabilities
Although programs such as ZDI and VCP are popular, hackers can earn ten times the bounty by going through SNOSoft; significant flaw research can earn as much as $120,000; smart disclosure falls by the wayside
-
-
Magal wins a $6 million contract to secure Israeli army bases
Deal follows recent successes with U.S. water authorities, banks concerned about underground tunnelling, and a Scottish hospital; company will install perimeter detection and command and control systems
-
-
Nuance and Appligent team up to secure PDFs
Converting text documents into PDF can open the door to determined thieves; safely redacting information at issue; new add-on software securely scrubs files for lists of redacted words and phrases
-
-
IBM predicts rise in security threats in 2007
Newly released Vista operating system a ripe target for malicious hackers; fuzzer attacks demonstrate a growing sophistication among the black hat set; IBM’s Internet Security System’s X Force Team pessimistic about the future
-
-
DARPA seeks to replicate black ice for use in Iraq
Envisioned mobility control system would force enemies to slip, while a reversal agent applied to U.S. vehicles permits effortless apprehension; companies interested in developing “polymer ice” have until April to respond
-
More headlines
The long view
Helping Strengthen America’s Critical Infrastructure
Everyday life depends on a robust infrastructure network that provides access to running water, communications technology and electricity, among other basic necessities. The experts who keep our national infrastructure secure and resilient also need a strong network to share their knowledge and train the next generation of professionals capable of solving complex infrastructure challenges.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.
Using Liquid Air for Grid-Scale Energy Storage
New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.
Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy
With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.
Experts Discuss Geothermal Potential
Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.