Energy Facility Security

Energy Facility Security

229
Electric vehicles (EV) are still far from the norm, but their increasing popularity is driving money into research for chargers and ancillary devices. Soon,...

331
80s films where computers could kill will soon become a reality, judging by a new Pentagon project. Raytheon, Northrop Grumman and Lockheed Martin are but...

394
Daniel Ehrenreich Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...

401
Olga Grosman-Ezrahi The world is always busy finding solutions for perimeter security, whether it is protecting critical infrastructures, airports etc. During the Video Analytics conference,...

229
ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...

94
The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...

135
The problem once again arises - how can the Federal Aviation Administration (FAA) manage the danger of drones flying too close to commercial flights...

171
A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...

226
Remember the signs surrounding military bases stating "military area, no pictures"? You probably already guessed that not everyone follows the rules and UAVs are...

180
Scottish researchers have developed an ultrasound sensor that is able to detect cracks and faults in buildings and facilities, such as oil pipelines and...

211
Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems -...

179
If a hacker is capable of breaking in to our computer systems, with a little more effort surely they could disrupt larger targets as...

181
Nonaggression pacts signed between countries in the past, such as the Ribbentrop-Molotov agreement between the USSR and Nazi Germany, were meant to prevent a...

409
An Iranian official has threatened Israel with a “crushing response” to any attemp to tamper with its technological infrastructures. According to the Irani Communications...

263
Electromagnetic threats such as strong solar flares or intentional nuclear blasts by terrorists could paralyze the entire power grid of a country for several...

130
The rush to automate more factory processes may look like it’s saving money, but to Ken Westin, a senior security analyst at Tripwire, it’s...

90
The HomeLand security market, which includes maritime, aerial and land borders security, as well as national infrastructure defense, transportation security and defense from cyber...

578
In a conference recently held in the state of Wyoming, U.S., an FBI official of the criminal and national cyber security squad said that...
video

180
Interview with Elad Gilat Marketing manager, Puzzle project Offshore installations technology protection and the tasks of personnel in the loop. Designing a seamless protection system and...
video

455
Gadi Bar-Ner , VP Marketing MAGOS

321
Since the big tzunami disaster in Japan in 2011 that damaged the nuclear power plant if Fukushima, many have been trying to get inside...

417
Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...

iHLS Events