This month, it was revealed that Hezbollah agents operating in Europe made procurements for “parts and technologies” in Bulgaria which would allow them to...
A simple, basic medical device aimed at saving lives on the battlefield was developed and manufactured by a medical start-up company based in Ra'anana,...
The Iraqis are using a deadly weapon system against the Islamic State of Iraq and Syria (ISIS). This is the Russian-built TOS-1A multiple launch rocket...
By Dudi (David) Yaron
During the Second Lebanon War (2006) known as Operation "Change of Direction" the Israeli Air Force, within just 34 minutes, destroyed...
New cyber security monitoring and detection solution announced by CELARE, a BATM Advanced Communications Limited (LSE: BVC; TASE: BATM) cyber security subsidiary.
The firm has...
The British House of Lords is holding an inquiry into the civil use of drones, to determine whether the conditions are right “for the industry to take...
In response to increasing reports of damaging #data breaches in both the public and private sector, many businesses are implementing #cyber strategies that leave...
The Department of Homeland Security allocated to Jewish institutions $12 million, or 94 percent, of $13 million in funds for securing nonprofits.
The #Jewish Federations...
The British government is preparing new rules that will allow autonomous #vehicles on the public highways .Today, #driverless cars are only allowed to travel...
The U.S. National Security Agency’s (#NSA) actions have and will continue to cause “significant damage” to U.S. interests and the global Internet community, the...
DHS’s plan to deploy fifty surveillance towers across southern Arizona is temporarily on hold, following a protest by Raytheon that the agency improperly awarded...
The Israeli Air Force (IAF) has introduced its Elbit systems Hermes-900 unmanned air system (UAS) into service ahead of schedule to support operation "Protective...
A delegation of Israeli fire fighters headed out to Spain recently, to receive special training covering fire fighting in tunnel environments. “Every tunnel carries...
Two security experts demonstrated how hackers can exploit cloud services to build money-mining botnets.
Cloud computing is becoming the paradigm most abused by cybercrime, cloud...
This week, the U.S. Army will brief arms manufacturers on the design requirements for a new standard-issue handgun. Several gun makers will compete for...
When Chief Information Security Officers (CISOs) and Chief Security Officers (CSOs) talk, people listen, as evinced by the monthly Twitter #infosecChat hosted by IBM...