Time and again, the protection of data from unauthorized access is proving more and more challenging. One of the most common cyber security problems...
Crimes are solved by law enforcement following up on intelligence information from ballistic imaging technology. Who is the shooter and how did they get...
Internet-of-things devices are vulnerable to various cyber threats. Recent reports suggest that one of those supposed attacks is the side-channel attack. This tactic seeks...
The Israeli company Rafael has unveiled a new long-range strike missile, with built-in autonomous capabilities and a range of 300 kilometers. According to Rafael...
The US intelligence community has been slow to adopt artificial intelligence/machine learning capabilities to make sense of masses of untapped open-source intelligence (OSINT) data....
Protecting healthcare organizations from cyber-attacks can be a matter of life and death. Healthcare organizations are vulnerable to various cybersecurity threats demanding from them...
By Or Shalom
Cyberattacks targeting the health sector have intensified following the COVID-19 crisis. The US Department of Health and Human Services and the Office...
First response and public safety operations have been confronting emerging and continuing threats, such as cyber-attacks and COVID-19 implications.
Using data to drive changes in...
In military training sessions, simulation tools usually generate a huge volume of data. Accessing training data can benefit senior officials, who can explore where...
iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event. A large two-day exhibition with national pavilions...
Advanced video surveillance capabilities have many applications in business, industry and society in general, and are evident in a major market growth. The global...
A new event-driven video surveillance software feature will create actionable intelligence for security operations. The new Calipsa Pro Analytics software suite by Calipsa adds...
MIT researchers have released a new search engine that lets someone "Google" a technology's future growth potential, predicting how fast it is advancing. When...
The oil and natural gas 00industry worldwide is exposed to increasing cyber threats as this industry is becoming more interconnected. State and criminal actors...
By Or Shalom
The planning and application of prison facilities security are complex tasks, due to the wide range of potential threats. These result mainly...
With an explosion of data and phone devices and computers in recent years, workloads for law enforcement investigators have grown exponentially, and It’s taking...