Port act a victory for cargo chain security 

The Retail Industry Leaders Association (RILA) and the National Retail Federation (NRF) are hailing President Bush's recent signing of the Security and Accountability for Every (SAFE) Port Act as a victory for security of the cargo chain.
Congress passed the legislation on Sept. 30. It enhances the multi-layered, risk-based cargo security system the U.S. government has developed since the Sept. 11 attacks. Among other provisions, the bill establishes a $400 million annual port security grant program, codifies existing port security programs such as the Customs-Trade Partnership Against Terrorism (C-TPAT) and requires the Department of Homeland Security to develop plans for resuming trade in the event of an attack on ports....

Information theft highlights the latest bank security problems 

"Lock bumping" back to forefront 

Thieves are cashing in on a not-so-new break-in technique that can give them access to locked materials in seconds.
Criminals can pop open thousands of ordinary pin tumbler locks with a technique called bumping -- when a specially-cut key is inserted and knocked on, causing all the pin tumblers in the lock to split and the lock opens....

Security barriers pose safety hazard? 

State-of-the-art ID check technology available to schools 

Security tips for school administrators 

President Bush today called experts together after three deadly shootings at schools in Wisconsin, Colorado and Pennsylvania (see securitysolutions.com/news/school-shootings-security-concerns/).
In panel discussions led by members of Bush's Cabinet, speakers said the best response is basic: get parents, school leaders, students and police to work together.
"Our first line of prevention is really having good intelligence," said Delbert Elliott, director of the Center for the Study and Prevention of Violence in Boulder, Colo. He said schools should encourage kids to speak up when they hear classmates boasting of violent plans. The Bush Administration, compelled to respond to the violence of the last two weeks, said a public sharing of ideas would help because the nation is suddenly focused on school safety.
With school security top-of-mind, here is a checklist to help school administrators determine potential weaknesses in campus security, from Patrick V. Fiel Sr., a public safety adviser specializing in education for ADT Security Services Inc.:...

Infrastructure protection consortium forms 

Government unveils biometric information Web site 

Seven steps to securing USB devices 

New wave of shootings brings school security back to the forefront 

In the span of a month, schools across the country have seen a dramatic rise in violent incidents:
* A 32-year-old dairy truck driver storms a one-room Amish school in Pennsylvania and kills five girls.
* A drifter walks into a Colorado school and fatally shoots a student before taking his own life.
* Wisconsin authorities charge three boys with plotting a bomb attack on their high school.
* A student in a rural school allegedly shoots his principal.
* A gunman bursts into a Vermont elementary school looking for his ex-girlfriend and guns down a teacher.
Is something wrong with school security? Experts say there is simply no way to guarantee that a stranger or student won't be able to injure or kill on school grounds....

Five business tips to combat information theft 

ASSA ABLOY, Cisco Announce Partnership 

TSA begins school transportation security program 

National emergency response plan for transit launched 

The American Public Transportation Association (APTA) has announced that more than 125 public transportation agencies and suppliers across the nation have agreed to participate in a new national Emergency Response and Preparedness Program....

Dallas tops list of most dangerous large cities 

Five business tips to combat information theft 

The common notion is that information theft is a crime committed by computer hackers who steal information via the Internet. The reality is that a lot of information is stolen from unsecured files and paperwork. The source of the crime is often corporations, small businesses and other organizations that hold sensitive data on file....

Retail industry backs Senate on Port Security Act 

Businesses need emergency supply kits, FEMA says 

Business owners everywhere are urged to assemble an emergency supply kit. Emergency preparedness officials with the U.S. Department of Homeland Security's Federal Emergency Management Agency (FEMA) and the U.S. Small Business Administration have produced a list of items for small and large companies to consider as they plan a survival kit for disaster....

New Mexico a proving ground for border security technology 

Iris, vascular recognition technology test results released 

Are buildings prepared against bio-terrorism? 

The anthrax-laden envelopes sent to the American Media Building and the Hart Senate Building in 2001 demonstrated that biological weapons are not only a viable means of inflicting casualties on U.S. soil but also that some groups will not hesitate to use them.
Those envelopes produced five deaths and 13 infections. How vulnerable are U.S. buildings to the bio-threat today? According to a report by Universal Detection Technology, a combination of technology and government awareness can keep the threat at bay, but building owners and managers should be aware of the potential for disaster....

Buffalo to start school year with new security chief 

Biometric technology application manual now available 

Center challenges security industry to defend America 

The Chesapeake Innovation Center (CIC), a business accelerator for Homeland and national security, has issued a call for companies with innovative technology for the first "Defend America Challenge," a competition open to companies with a product or service specializing in the Homeland or national security field. The grand prize is $25,000....

Supply chain coalition takes port security message to Congress 

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | Next

Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top