Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Terra Firma chooses ControlGuard’s endpoint security solution

    As the size of the mobile work force increases, with more and more employees carrying and using portable devices, the security risks a company faces increase apace; how does a corporation enjoy the benefits of greater efficiency and timeliness which mobility brings, without at the same time exposing itself to detrimental risks? The solution is endpoint security, and a leading international private equity firm has just selected an endpoint security solution from ControlGuard

    • Read more
  • Cory Lidle's death recalls similar historical events

    Small planes crash into buildings far more often than one would expect; episodes at the Empire State Building, and in Tampa and Milan, show danger

    • Read more
  • University of Colorado announces first-in-nation PhD program

    Degree to be offered as early as the fall, pending $1.9 million in federal funding; public policy program will focus on infrastructure threats

    • Read more
  • Black Duck announces new encryption export compliance software

    Backed by Fidelity Ventures, Flagship Ventures, and other leading VCs, company adds to its software compliance offerings; technology scans software for encryption algorithms and helps developers avoid DoC fines; Cuba and Iran among countries targeted by export restrictions

    • Read more
  • Establishing product liability a smart way to confront IT security problems

    IT companies use shrink wrap agreements to avoid responsibility, but costs are transferred to consumers with no guarenteed increase in security; shifting liability to software companies may push some out of the market, but some say that will all be for the best

    • Read more
  • Indiana receives $1.2 million for lake and river security

    Money will be used to purchase powerboats, the trucks to tow them, thermo-imaging devices, and side-scanning sonar units

    • Read more
  • Experts say utilities need to do much more

    Electricity and gas plants may be the first to suffer the consequences of disrupted service; alongside barriers and surveillance systems, companies should make sure to work with local authorities to develop emergency response plans

    • Read more
  • NICE Systems to protect Eiffel Tower

    NiceVision video analytics software will help authorities sort through the monument’s six million annual visitors; globetrotting company is also working in Philadelphia and Beijing

    • Read more
  • Experts recommend vigilence in IT security pricing

    Vendors do well in part because clients are afraid to switch due to cost concerns; savvy IT professionals should price out the market and not be afraid of playing one vendor against another; software packages can be a good deal, but be wary of pricing methods

    • Read more
  • Keeping messages over the Internet secure by making them faint

    Wireless and Internet communication is vulnerable to eavesdropping and theft; traditional methods of keeping messages secure — encryption and scrambling — may be expensive to implement; two Princeton researchers suggest a new technique to keep transmissions safe, a technique which relies on the properties optical-fiber networks

    • Read more
  • Congress proposes new regulations on the sale of fertilizer

    Bill would force buyers to provide identification and require sellers to register with DHS or an appropriate state agency; a number of states already have similar laws intended to stymie another Timothy McVeigh; Farm Bureau continues to resist federal intrusion

    • Read more
  • Rising energy costs threaten IT expansion

    Power-hungry security solutions may face dark days; energy costs projected to eat up 50 percent of future IT budgets; Internet and software-based approaches gain an edge

    • Read more
  • Federal IT security spending to drop 50 percent in 2007

    Government to spend only $118 billion in the face of congressional belt-tightening; major contracts still to come include: GSA’s Alliant, Treasury’s Project Support Solutions, and Agriculture’s Multiple Award Information Technology Support Services

    • Read more
  • DHS IT auditing office criticizes its own security procedures

    Failure by the inspector general’s office to implement a standard laptop configuration that meets required DHS and federal guidelines; the failure Inspector general’s office cited for having failed to implement procedure to identify relevent software patches and update; lost and stolen laptops a major issue

    • Read more
  • University of Texas wins $3.1 million DHS training grant

    Award follows the Center for Infrastructure Assurance and Security’s participation in Cyberstorm and Dark Screen cyberterrorism exercises; grant to support state and municipal cybersecurity training efforts

    • Read more
  • « first
  • ‹ previous
  • …
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • AI's thirst for power keeps coal fires burning bright
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • US wastewater tests show bird flu virus limited to areas with farm animals
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Is the nation’s water supply safe from attack?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • A Turning Point: U.S. Recognizes Agriculture as a Domain of Defense

    The US has legitimized the role of food supply in national defense. It has recognized that in a world of rupture, a nation that cannot feed itself cannot defend itself. A new policy effectively ends the era of agriculture functioning solely as a commercial sector.

    • Read more
  • The US Doesn’t Need to Generate as Much New Electricity as You Think

    Load shifting and improving energy efficiency could reduce the need for new power plants, but utilities often profit more from building than saving power.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies