News

News

At least two Boeing KC-46A aerial refueling aircraft are needed immediately to the Israeli airforce (IAF). While the negotiations between Washington and Jerusalem on...

Mobile device security evolved rapidly over the last few years to address the new challenges and requirements of a mobile workforce. User authentication has...

Abu Wardah Santoso, Indonesia’s most wanted Islamist militant, was killed in a shootout with security forces. Santoso, who was the leader of the East...

By Arie Egozi In the past, it seemed that the Europeans had buried their heads in the sand in order to avoid calling the problem...

By Vickie Zisman The Israeli defence industries constantly need to recruit new employees in order to fulfill the new requirements. The global recession in the defence...

  Today's complex Intelligence, Surveillance and Reconnaissance (ISR) environment requires complete end-to-end solutions tailored to fit various mission requirements SPYDR II is a next-generation small manned...

The Egyptian government has recently launched a new cybersecurity division in order to defend its institutions from cyber attacks. When one understands the scope...

Observation systems are a vital tool in every battlefield. They span from personal systems to portable systems by soldiers or vehicles. The systems enable...

The problem of Paletsinians who enter Israel illegally (“shabah”) is becoming more and more serious. It seems, and not only to me, that someone has...

US policies regarding cyber security raise interest in governments, organizations and businesses all over the world. Many wonder wheather the upcoming presidential elections in...

A first of its kind memorandum of understanding (MOU) was signed between iHLS and Global Tech Korea, a Korean governmental program. GT (GlobalTech) is the international program...

Seaports customs and security professionals might sometimes miss contraband attempts, including radiological materials. The problem was hightened during a US congressional hearing, when officials...

The US National Consortium for the Study of Terrorism and Responses to Terrorism (START) has released an update to its Global Terrorism Database (GTD)....

Hacking has become one of the auto industry's biggest concerns, especially as modern cars add more electronic controls and infotainment systems. Last March, the...

Seven computers will compete in the first all-machine cyber defense tournament on Aug. 4 in Las Vegas. This is the result of a multiyear...

  The threat of violence continues to affect Jewish religious organizations all over the world. That’s why funding is vital when it comes to planning...

A conflict between the principles of civil rights and security requirements has been reflected by the attempt of  US defense authorities to install explosion...

  British airports are considering using digital technology to monitor planes in place of air traffic controllers. Cameras and sensors could make traditional towers “obsolete” by...

Argentina has been confronting various challenges, which have brought it to push forward its UAV (unmanned aerial vehicle) project. Argentina’s Ministry of Defence decided to...

A nationwide coverage of the Netherlands in a wireless Internet of things (IoT) network was completed last month. The network can connect sensors monitoring...

  By ARIE EGOZI North Korea has launched ballistic missiles to show that it was not afraid from the empty warning of the U.S. Iran is...

The U.S Air Force is in the midst of an overall effort to enhance the capabilities of the sensors carried by its UAS. This...

Latest