Energy Facility Security

Energy Facility Security

391
Olga Grosman-Ezrahi The world is always busy finding solutions for perimeter security, whether it is protecting critical infrastructures, airports etc. During the Video Analytics conference,...

218
ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...

88
The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...

133
The problem once again arises - how can the Federal Aviation Administration (FAA) manage the danger of drones flying too close to commercial flights...

166
A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...

220
Remember the signs surrounding military bases stating "military area, no pictures"? You probably already guessed that not everyone follows the rules and UAVs are...

175
Scottish researchers have developed an ultrasound sensor that is able to detect cracks and faults in buildings and facilities, such as oil pipelines and...

206
Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems -...

169
If a hacker is capable of breaking in to our computer systems, with a little more effort surely they could disrupt larger targets as...

173
Nonaggression pacts signed between countries in the past, such as the Ribbentrop-Molotov agreement between the USSR and Nazi Germany, were meant to prevent a...

397
An Iranian official has threatened Israel with a “crushing response” to any attemp to tamper with its technological infrastructures. According to the Irani Communications...

260
Electromagnetic threats such as strong solar flares or intentional nuclear blasts by terrorists could paralyze the entire power grid of a country for several...

127
The rush to automate more factory processes may look like it’s saving money, but to Ken Westin, a senior security analyst at Tripwire, it’s...

85
The HomeLand security market, which includes maritime, aerial and land borders security, as well as national infrastructure defense, transportation security and defense from cyber...

565
In a conference recently held in the state of Wyoming, U.S., an FBI official of the criminal and national cyber security squad said that...
video

177
Interview with Elad Gilat Marketing manager, Puzzle project [youtube https://www.youtube.com/watch?v=g66arOexCRk?list=PL2lcLUTJmbODltavrkE8WwhQW5aFIlYMk] Offshore installations technology protection and the tasks of personnel in the loop. Designing a seamless protection system...
video

446
[youtube https://www.youtube.com/watch?v=V5W7ZQf615M?list=PL2lcLUTJmbODltavrkE8WwhQW5aFIlYMk] Gadi Bar-Ner , VP Marketing MAGOS

309
Since the big tzunami disaster in Japan in 2011 that damaged the nuclear power plant if Fukushima, many have been trying to get inside...

403
Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...

295
As city centers became more crowded, so did crime become more common. In dealing with rising crime rates in its region, the Orlando City...

iHLS Events