-
Google pushes federal governent sites to expand searchable content
As much as 40 percent of government content is unavailable to search users; penetrating the “deep Web” is key; an OMB order requires agency cooperation, but the deadline has passed and Google is lending a hand to get the program back on track
-
-
BT acquires Counterpane Internet Security
IT security is a growing problem – and a growing business; BT has many corporate customers, and to offer these customers a more robust managed security service with enhanced auditing and reporting capabilities, it has just acquired a California IT security outsourcing specialist
-
-
Unisys launches new business security ad campaign
Targeted at C-level executives, initiative includes a Fortune magazine cover featuring the recipient’s photograph; company hopes to sell IT security and continuity as competitive advantages, not as reactive responses to threats
-
-
Physical and IT security teams merge
Guards on patrol are now instructed to keep an eye out for open wireless networks and passwords written on sticky pads; $1.1 billion spent each year on bringing the two cultures together, but problems remain; integrating building and network access an emerging trend
-
-
The state of U.K. critical infrastructure is not good
Looking for investment opportunities? Look no farther than the U.K. critical infrastructure; a just-published experts report highlights that many weaknesses that need to be addressed, the many problems that must be resolved
-
-
New business opportunities in radiation detection technologies
The North Korea nuclear test, and the inexorable march of Iran toward acquiring nuclear weapons, increase the risks of nuclear weapon proliferation; there are thus many opportunities in developing new radiation detection technologies
-
-
Security officials worry about Google Earth
Terrorists may use satellite images to identify targets and plan attacks, experts say; concern is global as Dutch, Russians, and others worry; democratizing Internet spreads access to high resolution photographs; rogue nations the big winners here
-
-
Attensity partners with IBM
Companies, both leaders in managing unruly computer files, come together to improve the IBM Information Server; for Attensity, the deal is another success among many; for IBM, a way to attract customers interested in pulling relational information out of unstructured data
-
-
Serial IT security entrepreneur is at it again
Phishing, that is, the Internet-based theft of identity, is damaging the economy to the tune of about $46 billion a year; an IT security entrepreneur who has already launched two successful companies has just closed the financing round for his new venture — a company aiming to combat phishing
-
-
Terra Firma chooses ControlGuard’s endpoint security solution
As the size of the mobile work force increases, with more and more employees carrying and using portable devices, the security risks a company faces increase apace; how does a corporation enjoy the benefits of greater efficiency and timeliness which mobility brings, without at the same time exposing itself to detrimental risks? The solution is endpoint security, and a leading international private equity firm has just selected an endpoint security solution from ControlGuard
-
-
Cory Lidle's death recalls similar historical events
Small planes crash into buildings far more often than one would expect; episodes at the Empire State Building, and in Tampa and Milan, show danger
-
-
University of Colorado announces first-in-nation PhD program
Degree to be offered as early as the fall, pending $1.9 million in federal funding; public policy program will focus on infrastructure threats
-
-
Black Duck announces new encryption export compliance software
Backed by Fidelity Ventures, Flagship Ventures, and other leading VCs, company adds to its software compliance offerings; technology scans software for encryption algorithms and helps developers avoid DoC fines; Cuba and Iran among countries targeted by export restrictions
-
-
Establishing product liability a smart way to confront IT security problems
IT companies use shrink wrap agreements to avoid responsibility, but costs are transferred to consumers with no guarenteed increase in security; shifting liability to software companies may push some out of the market, but some say that will all be for the best
-
-
Indiana receives $1.2 million for lake and river security
Money will be used to purchase powerboats, the trucks to tow them, thermo-imaging devices, and side-scanning sonar units
-
More headlines
The long view
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse
The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.