By Benedetta Berti
On January 22, 2014 representatives of the international community once again reconvened in Switzerland in an attempt to broker a negotiated agreement...
People interested in attending the 2014 Winter Olympic Games in Sochi are advised to take extra precautions to protect themselves from cyber attacks during...
Israeli companies consider offering systems for the new British army combat vehicles.
This as Britain’s future protected support vehicle lineup is starting to emerge as...
The Lithuanian armed forces will be equipped with a 7.62 mm assault rifle.
Lithuania’s Ministry of Defense has ordered FN SCAR-H PR semi-automatic rifles for...
France will soon launch a 1.5-billion-euro ($2 billion) plan to defend itself against "cyber war" as a strategic priority, Defense Minister Jean-Yves Le Drian...
Following the recent privatization of the Eilat Port, management decided to upgrade security in all of the port compounds. The D.O.G-Sec company won the...
Rafael will be participating at DEFEXPO - Land, Naval and Internal Security Systems Exhibition, 6th-9th February, Pragati Maidan - New Delhi, India.
Rafael will present...
A specially-equipped U.S. naval ship departed for Italy on Monday on a ground-breaking mission to destroy Syria’s most dangerous chemical weapons, Pentagon officials said.
According...
The MLM division of Israel Aerospace Industries (IAI) has reached a very advanced stage in the development of its Top Gun precision artillery shells....
By Ms. A. F. Trevisi, Research Assistant, ICT
Terrorism in the Tri-Border Area (TBA) has become a salient, highly-publicized issue. The region is frequently called...
2013 was an especially successful year for Elbit Systems’ unmanned aircraft systems operations, where the Hermes family, particularly the most advanced of the UAV...
A drone belonging to the U.S. Department of Homeland Security has crashed off the coast of Southern California during a security mission, customs officials...
In 20 years the Israeli military will be completely different. Almost everything will change, including enlistment methods and general structure and especially the Air...
University of Michigan researchers have developed new ways to analyze Internet security risks by creating a mathematical model that can predict when a cyberattack...
Interview with Shahar Belkin, CTO of FST 21, on the concept of "convenient security", security systems that don't interfere with daily life. The full interview...