BCP

BCP

shielding

According to various scenarios, Israeli installations and civilians’ homes are constantly threatened by enemy rockets. Two new products provide essential protection and ballisic shielding...
cyber resiliency

The U.S. military’s weapons systems today are reliant on complex software and interconnectivity with a host of components, sensors and computer systems. The highly...
nuclear inspection

Autonomous UASs will fly inside ruined nuclear power stations to conduct inspections. A team led by Southwest Research Institute (SwRI) in the US is...
Police Helicopters Help Locating Suspects

New technology gave Omaha police officers a boost as they recently tracked a man in east Omaha who was suspected of driving a stolen...
iot

The market of the IoT connected devices is in the midst of a major revolution which has already altered every field, from domestic devices,...
People For Gun Control

Israel exists under constant threat of attack and requires citizens to serve in the military, but still has much stricter gun laws than the...
Gun Owners Marking

In light of recent events that happened all across the world and mainly in the US, experts have long been thinking of ways to...
big data

What is the connection between big data technologies and business disaster recovery procedures? Disaster recovery and business continuity technologies have come a long way...
anti terror

Britain has suffered quite a few terror attacks, mainly be Islamist Groups, with one to note is the London Underground attack in 2005. Now,...
cyberattacks

What were the major trends in the global cyberspace during 2017? According to a report by Clear Sky Cyber Security, the main attacks were...
cyber

Israel’s national cyber agencies (the National Cyber Bureau and the National Cybersecurity Authority) will be merged into one entity, the National Cyber Array, which...

Subway systems are complex with many moving parts and miles of tunnels. A new project focuses on cleaning up a subway system after the...
cyber

Is an extensive cyber attack expected again? The Ukrainian cyber security firm, ISSP, recently announced that it may have detected a new computer virus...
disaster areas

Following large fires, hurricanes or earthquakes, first responder teams in disaster areas sometimes have to refrain from entering unstable structures, due to the danger...
drone

The US Air National Guard has deployed medium-altitude drones to help airlift and search-and-rescue units find victims in the hurricane disaster-stricken areas. The Guard...
disaster response

Disaster response under conditions of lack of conventional communication or internet networking, requires more traditional solutions.   A citywide communications exercise was recently held by...
Critical Transportation Infrastructure

Protecting critical infrastructure isn’t just about preventing malicious attacks, but also mitigating the damage of natural disasters. Transportation infrastructure such as subway tunnels are...
rapid DNA identification

A rapid DNA identification technology developed by the US Department of Homeland (DHS) Security Science and Technology Directorate (S&T) has recently been used to...
first responders

Hurricane Matthew was one of the first operational uses of the US Department of Homeland Security (DHS) Science and Technology Directorate’s (S&T) HURREVAC-eXtended (HV-X)...
drones

A new network will allow pilots of drones to fly farther distances, even outside their line of sight, which is currently against FAA rules....
safe city solutions

Technological solutions by themselves are useful, but their real value is found when they complement one another. A wide array of homeland security technologies...
anti-terror

The Czech Interior Ministry wants to push through a constitutional amendment which will enable citizens to hold firearms licenses and to use their weapons...

iHLS Events