Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Network security

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • COMMON-SENSE NOTES // By Idris B. OdunewuThe Future of Open Data in the Age of AI: Safeguarding Public Assets Amid Growing Private Sector Demands

    AI offers immense potential, but that potential must be realized within a framework that protects the public’s right to its own information. The open data movement must evolve to meet this new challenge—not retreat from it.

    • Read more
  • AILatest Reasoning Models from OpenAI to Be Used for Energy and National Security Applications on Los Alamos’s Venado Supercomputer

    Los Alamos National Laboratory has entered a partnership with OpenAI to install its latest o-series models — capable of expert reasoning for a broad span of complex scientific problems — on the Lab’s Venado supercomputer.

    • Read more
  • CYBERSECURITY EDUCATIONUA Little Rock Secures $4.65 Million Grant to Advance Cybersecurity Education

    By Angelita Faller

    The grant, funded by the National Centers of Academic Excellence in Cybersecurity (NCAE-C) within the National Security Agency, will enable UA Little Rock to enhance its efforts in preparing high school teachers to teach cybersecurity.

    • Read more
  • CYBERSECURITYIs DOGE a Cybersecurity Threat? Explaining the Dangers of Violating Protocols and Regulations That Protect Government Computer Systems

    By Richard Forno

    Teams from the Department of Government Efficiency (DOGE) are dropping into federal agencies with a practically unlimited mandate to reform the federal government in accordance with recent executive orders. As a 30-year cybersecurity veteran, I find the activities of DOGE thus far concerning. Its broad mandate across government, seemingly nonexistent oversight, and the apparent lack of operational competence of its employees have demonstrated that DOGE could create conditions that are ideal for cybersecurity or data privacy incidents that affect the entire nation.

    • Read more
  • CYBERSECURITYFive Cybersecurity Tips to Protect Yourself from Scams and Deepfakes

    By Kerisha Parkes

    In an age where misinformation and deepfakes blur the lines between fact and fiction, identifying scams has never been more challenging. Cybersecurity experts share their top tips to help you protect yourself and your loved ones from scams and identity theft.

    • Read more
  • CHINA WATCHChinese Vessel Suspected of Severing Submarine Cables Still Anchored in Baltic Sea

    By Henry Ridgwell

    European allies in the Baltic region are investigating how two fiber-optic data cables were severed earlier this week, with suspicion falling on a Chinese vessel in the area. Germany has said the incident was clearly sabotage.

    • Read more
  • DEEPFAKES & THE ELECTIONVoters: Here’s How to Spot AI “Deepfakes” That Spread Election-Related Misinformation

    By Emma Folts

    For years, people have spread misinformation by manipulating photos and videos with tools such as Adobe Photoshop. These fakes are easier to recognize, and they’re harder for bad actors to replicate on a large scale. Generative AI systems, however, enable users to create content quickly and easily. Domestic and foreign adversaries can use deepfakes and other forms of generative AI to spread false information about a politician’s platform or doctor their speeches.

    • Read more
  • CYBERSECURITYCyberForce Competition Challenges College Students to Use Cybersecurity Skills to Defend Their Wind Energy System

    By Jenna V. Wray

    College teams will work to outsmart a simulated attack on a U.S. wind energy plant. The CyberForce Competition offers students hands-on experience, igniting their passion for cybersecurity.

    • Read more
  • UNDERSEA CABLESSubsea Communications Cables: Vital but Vulnerable

    By Jocelinn Kang

    Ensuring the resilience of the submarine cable network against disruptions is crucial. Lying deep on the ocean floor, these fiber-optic cables can transmit massive amounts of data at high speeds with low latency, making them far more efficient than satellites, which handle only a fraction of global data transmission. 

    • Read more
  • ISRAEL’S PAGER ATTACKWhat We've Learned About the Hungarian, Bulgarian, and Norwegian Links To Hezbollah's Pagers

    By Riin Aljas, Balint Szalai and RFE/RL's Bulgarian Service

    A Bulgarian company with Norwegian links has surfaced in the supply chain of the pagers that detonated in Lebanon this week, killing 37 people and injuring several thousand others. The pagers, which were being used by members of Hezbollah, Iran’s most powerful proxy in the Middle East and designated as a terrorist organization by the United States, exploded simultaneously across Lebanon on September 17.

    • Read more
  • ISRAEL’S PAGER ATTACKPagers and Walkie-talkies Over Cellphones – a Security Expert Explains Why Hezbollah Went Low-Tech for Communications

    By Richard Forno

    In general, I believe the adversary in an asymmetric conflict using low-tech techniques, tactics and technology will almost always be able to operate successfully against a more powerful and well-funded opponent. But from a cybersecurity perspective, Israel’s attack on Hezbollah’s pagers shows that any device in your life can be tampered with by an adversary at points along the supply chain – long before you even receive it.

    • Read more
  • CYBERSECURITYCybersecurity Suite Now on Duty Defending the Nation

    By Michael Ellis Langley

    For the better part of a decade, dozens of Sandia engineers, each working on pieces of a new national security tool alongside federal partners, have revolutionized cybersecurity forensics with the Thorium platform and tool suite.

    • Read more
  • CYBERSECURITYComputer Scientists Discover Vulnerabilities in a Popular Security Protocol

    By Katie E. Ismael

    A widely used security protocol that dates back to the days of dial-up Internet has vulnerabilities that could expose large numbers of networked devices to an attack and allow an attacker to gain control of traffic on an organization’s network.

    • Read more
  • ARGUMENT: VULNERALE INFRASTRUCTUREIt Is Time to Act

    There is, in a basic sense, nothing new to be said about the global computer outage of the week just pas, Dan Geer writes, so the time to act is now. “If we choose to act on what we know, then we also know that security policy and competition policy are henceforth conjoined. We cannot and will not have zero cascade failures if any tech is allowed to become universal, to become a monopoly in its sphere.”

    • Read more
  • IT INFRASTRUCTUREMassive IT Outage Spotlights Major Vulnerabilities in the Global Information Ecosystem

    By Richard Forno

    The global information technology outage on July 19, 2024, that paralyzed organizations ranging from airlines to hospitals and even the delivery of uniforms for the Olympic Games represents a growing concern for cybersecurity professionals, businesses and governments.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Chairman Green Introduces “Cyber PIVOTT Act” to Tackle Government Cyber Workforce Shortage
  • CISA issues guide to help federal agencies set cybersecurity priorities
  • Federal cybersecurity strategy faces a crucial test. Will it pass?
  • NSA releases a repository of signatures and analytics to secure Operational Technology
  • Training program to provide students with cybersecurity and cyber intelligence career opportunities
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies