Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Network security

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • From Iron Dome to Cyber Dome: Defending Israel’s Cyberspace

    In response to growing attacks against its infrastructure by formidable adversaries like Iran and its proxies, Israel recently announced that they are building a ‘cyber-dome’ or a digital ‘Iron Dome’ system to protect Israel’s cyberspace to defend against online attacks.

    • Read more
  • Supreme Court Rules Platforms Have First Amendment Right to Decide What Speech to Carry, Free of State Mandates

    The Supreme Court last week correctly found that social media platforms, like newspapers, bookstores, and art galleries before them, have First Amendment rights to curate and edit the speech of others they deliver to their users, and the government has a very limited role in dictating what social media platforms must and must not publish.

    • Read more
  • Discovery Highlights ‘Critical Oversight’ in Perceived Security of Wireless Networks

    Researchers have uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street.

    • Read more
  • ARPA-H Announces Program to Enhance and Automate Cybersecurity for Health Care Facilities

    The Advanced Research Projects Agency for Health (ARPA-H) announced the launch of the Universal PatchinG and Remediation for Autonomous DEfense (UPGRADE) program, a cybersecurity effort that will invest more than $50 million to create tools for information technology (IT) teams to better defend the hospital environments they are tasked with securing.

    • Read more
  • University Students Tackle Adventure in CyberForce — Conquer the Hill Competition

    University of Central Florida’s Cameron Whitehead wins CyberForce Conquer the Hill: Adventure Competition 2024. Whitehead was one of 112 students from 71 accredited U.S. colleges and universities who competed virtually to complete work-based cybersecurity tasks and challenges during a full day of energy sector-related adventure.

    • Read more
  • Cybersecurity Education Varies Widely in U.S.

    Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well trained to meet industry needs in a fast-changing field.

    • Read more
  • U.S. Needs a New Independent Armed Service — a U.S. Cyber Force: Report

    In the U.S. military, an officer who had never fired a rifle would never command an infantry unit. Yet officers with no experience behind a keyboard are commanding cyber warfare units. This should change, as the need to create a new independent armed service — a U.S. Cyber Force – become more urgent by the day.

    • Read more
  • States Rush to Combat AI Threat to Elections

    This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.

    • Read more
  • Tantalizing Method to Study Cyberdeterrence

    Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.

    • Read more
  • Houthi Attacks in Red Sea Threaten Internet Infrastructure

    The recent attack on the cargo ship Rubymar by the Iran-backed Houthis caused the crew to drop anchor, which damaged undersea internet cables, the US has said. Could the vital infrastructure now become a regular target?

    • Read more
  • Collegiate Cyber Defenders Shine in Inaugural Conquer the Hill — Command Edition Competition

    Seventy-five college students competed to test their skills in the fundamentals of IT and cybersecurity infrastructure. The DOE’s CyberForce Program aims to help develop a pipeline of skilled cyber defenders for the energy sector through competitions, webinars, career fairs, and resources for building skills.

    • Read more
  • $2.6 Million NSF Grant for FAU’s CyberCorps Student Scholarship Program

    A $2.6 million grant from the National Science Foundation (NSF) will allow FAU to establish a scholarship program in the rapidly growing field of cybersecurity. The program is managed by the NSF and DHS. Designed to increase the volume and strength of the nation’s cybersecurity workforce, the program provides full scholarships and stipends to students pursuing studies at the intersection of cybersecurity and AI.

    • Read more
  • UVA Engineering Researcher Has Plan to Defeat the Next Big Cyberattack

    “Zero-day attacks” are the cyberattacks that disable large-scale computer programs, catching their victims off guard. In recent years, they’ve been happening more often and have become increasingly difficult to fix. From zero-day to ransomeware attacks, UVA’s Ashish Venkat believes cybersecurity should be fast and affordable for all.

    • Read more
  • Computer Scientists Awarded $3M to Bolster Cybersecurity

    A $3 million grant from the DARPA, the research and development arm of the U.S. Department of Defense, aims to leverage reinforcement learning to make computer networks stronger, dynamic and more secure.

    • Read more
  • Cyber Defenders: Interns Take on National Security Challenges

    Over the past two decades, nearly 500 undergraduates and graduate students in cybersecurity, computer science, computer engineering and related fields have worked on research projects, attended training courses and technical tours while receiving mentorship and unparalleled networking opportunities.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Chairman Green Introduces “Cyber PIVOTT Act” to Tackle Government Cyber Workforce Shortage
  • CISA issues guide to help federal agencies set cybersecurity priorities
  • Federal cybersecurity strategy faces a crucial test. Will it pass?
  • NSA releases a repository of signatures and analytics to secure Operational Technology
  • Training program to provide students with cybersecurity and cyber intelligence career opportunities
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies