image provided by pixabay

New Dangerous Cyberattacks Target AI Systems

0
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems. AI...
image provided by pixabay

Call for Investors

0
Due to the current security situation, the Technology Innovation Centre is pushing to find investors to support startups participating in its programs. The participating startups...
images provided by pixabay

The Security Shortcomings of Microsoft

0
As can be seen reported across many news medias, Microsoft does not seem to be in a good spot at the moment, when it...
image provided by pixabay

Cyber Crisis Exercises in Critical Infrastructure and Operation Technology – in...

0
Written by Or Shalom Cyber crisis exercises have many benefits for the organization. The exercise allows experiencing scenarios (sometimes under conditions of uncertainty) and affects...
image provided by pixabay

Defense Innovation Unit Looks to Scale Its Tech

0
The Pentagon’s Defense Innovation Unit (DIU) is done with proving new tech and is focusing more on scaling it for broad military use. Doug Beck,...
image provided by pixabay

Decentralized Storage – A Solution to Cloud-Based Attacks

0
Nowadays, turning to cloud-based providers for data storage is a common practice of businesses. It offers a convenient and affordable solution, cutting costs of...
Image provided by pixabay

Small Businesses Are At Danger

0
The FBI is worried that as more large businesses and corporations invest in cyber security tools, hackers are increasingly targeting small and medium-sized businesses. In...

Top 5 Possible Trends in OT Security Market (emphasis on ICS)...

0
By: Or Shalom, HLS expert OT networks are continuing to pose a security risk for cyber security personnel. In addition to routine attacks, ransomware attacks...
Tank. image by pixabay

Ukraine Invites Manufacturers to Test Their Weapons on The Battlefield

0
Ever since the Russian troops invaded Ukraine on February 24th, western countries have slowly begun delivering various weaponry to the Ukraine troops in favor...
AI. image by pixabay

AI Boxes in Retail Protecting Businesses

0
Retail companies have begun employing AI boxes as a means of bettering their businesses. These AI boxes can help with many aspects of these...
IDF's School for UAV operators, photo by IDF Spokesman

Israel’s UAV Market: Growth Opportunities

0
A new report assesses the evolving trends in the UAV industry in Israel, in the context of various geopolitical, economical and technological influences in...
Drone swarm illust. Image by Pvt. James Newsome, US Army

Discover The Future at AUS&R 2022 – Unmanned Systems and Robotics...

0
Our lives are becoming increasingly reliant on unmanned tools and systems. Marine, air, and ground unmanned systems lead the military industry, and are catching...
Puma, Photo illust. US Army By Wikimedia

Countering Unmanned Threats: Homeland Security’s New Capabilities

0
Under a new agreement worth hundreds of millions of dollars, the U.S Department of Homeland Security will test a variety of advanced prototypes to...
Nissan Electric Vehicles, Photo illus. by Pixabay

NASA and Nissan Work Together to Create Batteries of the Future

0
Rapid growth continues in the electric vehicle industry. In just two months, the Japanese auto giant announced it was stopping all development of combustion...
Cybersecurity illus. by Pixabay

Researchers Setting Up a Virtual Cybersecurity Institute Worth $1.5 Million

0
In today's defense industry, computing capabilities, software, wireless systems and advanced technologies are used to transform cyber security vulnerabilities into actions that become significant...
uav

Patents Approved for Delivery UAV

0
Unmanned aerial vehicles (UAVs) are used for a growing number of applications, for both military and commercial purposes. A recent technique harnesses the technology...
cyber

How Companies Can Minimize Cyber Attack Damage

0
The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
drone

New Chinese Drone Could Serve Government Agencies

0
A new Chinese drone known as the ‘Mavic 2 Enterprise’ drone now features swappable search and rescue accessories. The drone was upgraded specifically to...
Internet

The End of the Internet Ecosystem as We Know It?

0
Facebook has recently been in the spotlight for a security breach that compromised over 50 million accounts. This is a concern not only to...
malicious drone illustration

New Detection Solution Against Malicious Drones

0
As drones become more prominently used, so does the misuse of these emerging technologies. New drone detection solution could protect military bases, venues, cities...
aerospace and defense

PwC Report: Which Way will Aerospace and Defense Industries Choose?

0
Aerospace and defense companies must focus on innovation in order to keep pace with new entrants. This is the recommendation of the Aerospace and...
American Patriot Missile

American Patriot Radar Will Be Replaced Faster

0
The U.S. Army sees a faster path to get a radar that can detect threats from 360 degrees to replace the current Patriot air-and-missile...

Latest

Image provided by pixabay

Data Breaches Are Connected to Mass Layoffs, Research

0
A research team from Binghamton University and the State University of New York explains the connection between mass layoffs and data breaches, theorizing that...