AI Technology as a Proactive Security Accelerator
Written by Or Shalom
The implementation of active security has many benefits. This kind of security is active and proactive by nature and is meant...
The Era of Smart Cities
The term “smart city” refers to the use of technology and data-driven solutions to enhance residents’ quality of life, improve efficiency and address various...
Deep Fakes and Identity Decentralization
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
New Dangerous Cyberattacks Target AI Systems
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...
Protecting Operation Technologies in Production Lines as a Market Accelerator Trigger...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
The Evolving Cybersecurity Landscape in 2024
The ever-evolving cybersecurity landscape promises to bring new cyber threat actors, vulnerabilities, and weaknesses to counter, and as technology evolves, so do cyber threat...
World’s 10 Most Advanced Military Robots
Armies worldwide use various automated machines for military purposes, combat, cargo, intelligence gathering, and much more. The following are 10 of the world’s most...
Zero-Day Vulnerabilities: What Are They What Can We Do Against Them
As we become increasingly reliant on digital platforms, so grow the threats, and one of the main fundamentals of cybersecurity is understanding potential vulnerabilities....
AI, Data, Storage, and Risks
Artificial intelligence is at its heart- data. The more complete the data on which it is trained, the more valuable the output. AI gains...
NASA Report on Unidentified Anomalous Phenomena Research
NASA announced it intends to take steps to understand unidentified anomalous phenomena (UAP, also referred to as UFO).
The space agency released mid-September the final...
Cyber Crisis Exercises in Critical Infrastructure and Operation Technology – in...
Written by Or Shalom
Cyber crisis exercises have many benefits for the organization. The exercise allows experiencing scenarios (sometimes under conditions of uncertainty) and affects...
Considerations in the Preparation and Implementation of Security Technologies in Olympic...
Written by Or Shalom
Preparations for the Olympics in France are at their peak, and so are the preparations in matters of security. The security...
Theoretical Physicist Calls AI Fears ‘Overblown’
Theoretical physicist Michio Kaku says that the public’s anxiety over new AI technology is misguided.
In an interview with CNN, Kaku said that chatbots will...
Seeing Is No Longer Believing – Is Generative AI Destroying The...
As Generative AI becomes more sophisticated, which is happening at top speed, it is important to ask: is Generative AI undermining the very foundation...
Global Trends and The Influence of R&D on the UAV Defense...
Article by Or Shalom
The use of UAVs for various missions has grown significantly in the past few years. In addition to their use in...
What Happened to BlackBerry?
If we look back a decade ago, to the early 2010s, we would be able to see many adults and youths alike using the...
Your Guide to Machine Learning
As technology evolves, terms such as artificial intelligence, machine learning and deep learning quickly penetrate public discourse. This guide will help clarify possible confusion...
On the Brink of Nuclear Terror?
By Emily B. Landau, Shimon Stein*
When Shultz, Perry, Kissinger, and Nunn published their op-eds on a world free of nuclear weapons in 2007 and 2008,...
Jordan and the Refugee crisis as reflected in social networks
By Dr Michael Barak
The severe economic crisis in the Hashemite Kingdom of Jordan is now the top subject in its public discourse, generally and...
Why the West Is Dismissing Russia, And Why It Really Shouldn’t
Konstantin Bodragin
It has almost become a truism that the Russian military is crumbling, inept, and bumbling. Recent activity, however, paints a picture of an...
The Bottleneck in Big Data Use for Homeland Security
By Meidata
Big data has been at the forefront of intelligence, police, and even border control for a while. It is changing the way organizations...
What Data Do Organizations Encrypt And Why?
Ilan Segelman, VP Sales & Business Development at Power communications and Operation Manager at Sophos Israel
We at Sophos believe that there is no such...