BCP

BCP

image provided by https://www.youtube.com/watch?v=-bgad3HRb64

A Chinese team of researchers released a study that claims robot dogs equipped with machine guns can rival human accuracy and marksmanship, which could...
Image provided by pixabay

The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges. The satellites orbiting Earth are crucial for...
Image by pixabay

The US military is reportedly considering developing acoustic sensors to counter drone threats inspired by Ukrainian prototypes used to find and track Russian drones....
image provided by pixabay

The international satellite-aided search and rescue initiative Cospas-Sarsat has been aided by NASA and enabled the development of multiple emergency location beacon types that...
images provided by pixabay

Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

Thanks to the rapid development of AI, autonomous weapons systems (or "killer robots") will soon become a reality, and many international organizations have called...
Image provided by pixabay

Bosch's new Gun Detection System combines video and audio AI in a multi-layered approach for proactive school security and offers a cost-effective, minimally invasive...
image provided by pixabay

Drones have rapidly evolved from playing a supporting role in military operations to becoming an essential component of modern warfare, and governments worldwide need...
image provided by pixabay

A study conducted at University at Buffalo trains ChatGPT to recognize locations in disaster victims' social media posts and potentially help first responders reach...
image provided by pixabay

The governor of New York Kathy Hochul is acting in response to the rising antisemitic attacks and hate crimes since the Israel-Hama war, announcing...
image provided by pixabay

The IDF’s Unit 212 first used the innovative weapon "Iron Sting" - an innovative mortar bomb that can hit with revolutionary precision and reduce...
image provided by pixabay

Due to the current security situation, the Technology Innovation Centre is pushing to find investors to support startups participating in its programs. The participating startups...
image provided by pixabay

South Korean researchers have made a discovery that enables wireless communication below the Earth's surface, a development that could revolutionize rescue operations and communication...
image provided by pixabay

The Pentagon’s Defense Innovation Unit (DIU) is done with proving new tech and is focusing more on scaling it for broad military use. Doug Beck,...
image provided by pixabay

In an attempt to control the crowds arriving for the 2024 Paris Olympics next summer, the authorities plan to use real-time cameras and artificial...
Bio Hazard. image by pixabay

Following several biohazard epidemics, the COVID-19 pandemic and the 2001 anthrax attacks in the US, a critical infrastructure biodefense program will be established at...
Security. image by pixabay

By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
Disaster Recovery. image by pixabay

When a disaster occurs, whether by natural or human made means, it is crucial to obtain the latest and most recent information to guarantee...
A-UGV Mission Master SP

A Rheinmetall A-UGV successfully completed a variety of complex tasks during a live-fire drill held in April for delegations from the Netherlands, Belgium, Denmark,...
Photo illus. critical infrastructure by Pixabay

By Or Shalom OT (Operational Technology) networks continue to challenge cybersecurity experts. These networks are critical networks in various sectors, e.g. energy infrastructure, production lines...

The US government has been prioritizing zero-trust cybersecurity. Zero trust security asserts that devices should not be trusted by default, even if they are...