Border Security

Featured Videos

PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video...

News

Tue, 2016-11-08 11:11 AM

Veneziano

WASHINGTON, Nov. 7, 2016 /PRNewswire/ -- Food importers have precious little time to design, test and implement a Foreign Supplier Verification Plan, warned the FDA's former Director of Import...
Wed, 2016-11-02 02:19 AM

Rall

BLUE BELL, PA Oct. 18, 2016 Unisys Corporation (NYSE: UIS) today announced it was awarded a contract by U.S. Customs and Border Protection (CBP), part of the Department of Homeland Security, to...
Wed, 2016-10-26 05:54 AM
LONDON Oct. 21, 2016 Speaking on Wednesday night at an event at London's historic Guildhall, IFSEC brand director Gerry Dunphy outlined the vision for the new 'show within a show' which will meet the...
Wed, 2016-10-26 02:18 AM

Shapiro

ARLINGTON, VA Oct. 18, 2016 Today, the Consumer Technology Association (CTA)TM joined FWD.us in submitting comments to the Department of Homeland Security’s proposed International Entrepreneur Rule,...
Fri, 2016-10-21 01:30 AM

Reardon

RESTON, VA Oct. 20, 2016 Leidos (NYSE: LDOS), a global science and technology solutions company, was awarded a prime contract by the U.S. Department of Homeland Security (DHS), Customs and Border...
Thu, 2016-10-20 03:04 AM

Vaughan

WASHINGTON, Oct. 19, 2016 A new report by the Center for Immigration Studies analyzes the surge of aliens arriving at U.S. land borders and ports of entry without visas and requesting asylum. The...
Wed, 2016-10-19 04:12 AM

Antle

FAIRFAX, VA Oct. 12, 2016 Salient CRGT, Inc., a leading provider of worldwide training development and delivery, Agile software development, data analytics, mobility, cyber security, and...
Tue, 2016-10-18 06:43 AM
By Steve BittenbenderEditor, Government Security NewsA group of nine organizations and individuals filed suit in federal court Monday claiming the Department of Homeland Security has failed to study...
Wed, 2016-10-12 01:58 AM
LONDON, Oct. 7, 2016 The border management and security community is under immense pressure to adapt to contemporary external and internal pressures. Ongoing crises such as the huge movement of...
Tue, 2016-10-04 04:47 PM

Horowitz

FORT WORTH, TX Oct. 2, 2016 Elbit Systems of America, the U.S. subsidiary of Elbit Systems Ltd., will showcase its advanced technologies at the Association of the United States Army Annual Meeting in...
Tue, 2016-09-27 07:33 PM
By Joshua BreisblattContributorFor over two years, Customs and Border Protection (CBP) has examined body-worn cameras to see if this technology which is quickly becoming standard police practice,...
Wed, 2016-09-21 06:55 AM
ST. PAUL‚ MN Sept. 20‚ 2016 Recognizing faces in a crowd takes diligence and identifying each one correctly takes advanced technology. In order to support public and private security teams tasked...

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
 

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Lehi, UT, January 5 - Converus, Utah technology start-up, says its new lie detection technology called "EyeDetect" is what the U.S. government needs to screen Syrian...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

HySecurity’s HydraWedge SM50 and StrongArm M30 made a huge splash among the 30,000 ASIS security show attendees at the Anaheim Convention Center in September. ...

Greenville, RI and Uden, The Netherlands, October 27 - Videology announces a new CCD based camera board with 960 horizontal pixels, model 2XK17X.  Alrea...

White Papers

Establishing the first line of defense between a facility and a threat on its perimeter, the guard station can also define the image of a facility. Here are twelve questions to ask before specifying a guard booth.

 

To download this white paper please click here.