Coordination between the presenters of the air show, and the ground and maritime demonstrations, as well as the interfaces of the mobile broadcasting stations,...
The United States and India may be close to reaching an agreement to share databases regarding terror. The information shared between the two countries...
The need for a clear and reliable security system which broadcasts high-quality images is almost obvious. Whether for intelligence or surveillance, for securing areas, cities...
Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...
Following reports on Israel’s involvment in planting a spy software in the hotels where the nuclear talks took place, I-HLS was given the professional...
Irvine, California-based USMobile, a developer of private mobile phone services, launched the Scrambl3 app yesterday , a smartphone app that enables users to create...
Ten Israeli security firms have offered to provide security consultancy, intelligence and counter-terrorism expertise to Kenyan government and private security following a series of...
Smartphone technology built by Lockheed Martin promises to verify a user's identity based on the swiftness and shape of the individual’s finger strokes on...
Representatives from the U.S. Special Operations Command revealed that they were testing two rapid DNA readers in forward locations. The operators feed in a...
Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence
IBM (NYSE: IBM)...
The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...
The U.S DHS counterterrorism teams rely on cooperation from immigrant communities to obtain leads on radical individuals and pending terrorism plots, but many of...