State | Local Security
Federal, state and local investigators are in the initial stages of tracking down the person or persons responsible for two bombs detonated near the finish line of the Boston Marathon on April 15 that killed three people and wounded over 100, but said no one has claimed responsibility for the attack.
The latest details to emerge from the afternoon of chaos in the city included news that the bombs -- which were stuffed in trashcans near the race route -- contained ball bearings or BBs meant to cause even more substantial injuries to bystanders.
GSN 2012 Awards announced: White House deputy of homeland security recognized for leadership at annual gala
Hundreds of the best of the homeland security community’s federal, state and municipal government officials, government contractors, systems integrators, IT vendors and physical security product and solutions providers all came together the night of November 29 in a ballroom of the Washington, D.C. convention center to receive accolades.
The GSN awards dinner, which has become a Washington tradition over the last four years, offered a chance for the excellence and civic-minded spirit of homeland security efforts nationwide to be recognized.
The Government Security News 2012 Homeland Security Awards Program officially opened for entries on May 1, once again featuring 45 Awards in three broad Categories:Best Vendors of IT Security Products and Solutions, Best Vendors of Physical Security Products and Solutions and the 2011 Government Excellence Awards.
Government Security News has announced that its 2011 Homeland Security Awards Program will officially open for business and start accepting entries in the program’s 45 awards categories on Tuesday, April 26.
Alan Avidan, President, indicates that OzVision is pushing the forefront of hosted video services for dealers and users. The company’s government market includes military bases, government facilities, and national monuments such as the Washington Monument, the State of Liberty and Ford’s Theater. Avidan calls for dealers and central services to join in the hosted video movement, which he describes as the future of the industry.
Despite official murmurings a few months ago that the fiscal year 2011 budget request for DHS might decline slightly, the budget package unveiled on February 1 actually shows a three percent increase in “discretionary spending” by DHS in 2011, versus the prior year, and modest growth, at approximately the predicted rate of inflation, in the outer years.
U.S. Secret Service Director Julia Pierson resigned Wednesday in lieu of recent events involving the fence jumper who gained access to the White House on September 19th.
Homeland Security Director Jeh Johnson accepted Pierson’s resignation. Pierson served with the Secret Service for over 30 years and was the first female director. According to a statement released by DHS, Joseph Clancy has been appointed as the interim Acting Director of the Secret Service. Clancy retired from the Secret Service in 2011 and has been working in the private sector since.
Austin, TX-based HID Global, a provider of secure identity solutions, has announced completion of an access control pilot at Vanderbilt University in Nashville, TN, that has validated the use of smartphones as a convenient and compelling new way to open doors with a “tap” or using the company’s patented “Twist and Go” gesture technology for opening doors and gates from a distance.
Minneapolis, MN-based Code42, a provider of endpoint data protection and management for business and enterprise, has announced an application programming interface (API) integration with Splunk Enterprise -- a provider of operational intelligence platform -- to provide deeper, real-time visualization and search analysis of endpoint data.
Calabasas, CA-based Ixia has announced the IxFlow App for Splunk Enterprise, which integrates Ixia’s Application and Threat Intelligence (ATI) Processor with Splunk Enterprise. The app provides IT managers and teams the ability to visualize and analyze user, device and application behaviors. Additionally, the application data that is available can be used to optimize the network’s security and performance.