While autonomous vehicles real-world tests become more and more prevalent, the risk of hackers taking control of steering and braking systems are real. New...
Big Data Analytics is helping to quantitatively deal with the information overload, as well as to qualitatively improve intelligence assessments by drawing out patterns...
Online terrorist content has been fueling violent attacks in recent years. For example, ISIS’s recovering media network has been used to call on its supporters...
We are inviting ground-breaking startups in the security, defense and homeland security (HLS) fields to take part in a first-of-its kind startup competition.
iHLS is...
The old boundaries of cybersecurity and cyberattacks are disappearing — from the network perimeter, through distinct types of malware, to nation–state tactics vs. that...
When the desired target is not directly reachable over cyberspace, the kinetic engagement by military units equipped with the latest technological and tactical advancements...
A new cybersecurity intelligence and analytics platform has been unveiled. Tech giant Alphabet, the parent company of Google, formed a security company that uses...
The digitalization of the energy and infrastructure field in recent years has made it more vulnerable to cyber threats. Providing cybersecurity to critical infrastructure...
The US Defense Department is reviewing whether cellphones should be banned at the Pentagon - where 23,000 military and civilian personnel work at the...
US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...
What is the connection between big data technologies and business disaster recovery procedures? Disaster recovery and business continuity technologies have come a long way...
Most large organizations have billions of security-related logs per day and security analysts need to be able to automatically and intelligently parse critical data...
By Dorit Guterman, Ledico Security Systems, Tomer Nuri, Team
Information and cyber security events can occur also via security cameras and other IoT devices. As result,...
Things like lightning fast DNA processing, biometrics recognition based on iris scans, thumbprint or voice patterns and video face recognition from vast distances seemed...