Energy Facility Security

Energy Facility Security

ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...

The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...

The problem once again arises - how can the Federal Aviation Administration (FAA) manage the danger of drones flying too close to commercial flights...

A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...

Remember the signs surrounding military bases stating "military area, no pictures"? You probably already guessed that not everyone follows the rules and UAVs are...

Scottish researchers have developed an ultrasound sensor that is able to detect cracks and faults in buildings and facilities, such as oil pipelines and...

Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems -...

If a hacker is capable of breaking in to our computer systems, with a little more effort surely they could disrupt larger targets as...

Nonaggression pacts signed between countries in the past, such as the Ribbentrop-Molotov agreement between the USSR and Nazi Germany, were meant to prevent a...

An Iranian official has threatened Israel with a “crushing response” to any attemp to tamper with its technological infrastructures. According to the Irani Communications...

Electromagnetic threats such as strong solar flares or intentional nuclear blasts by terrorists could paralyze the entire power grid of a country for several...

The rush to automate more factory processes may look like it’s saving money, but to Ken Westin, a senior security analyst at Tripwire, it’s...

The HomeLand security market, which includes maritime, aerial and land borders security, as well as national infrastructure defense, transportation security and defense from cyber...

In a conference recently held in the state of Wyoming, U.S., an FBI official of the criminal and national cyber security squad said that...
video

Interview with Elad Gilat Marketing manager, Puzzle project Offshore installations technology protection and the tasks of personnel in the loop. Designing a seamless protection system and...
video

Gadi Bar-Ner , VP Marketing MAGOS

Since the big tzunami disaster in Japan in 2011 that damaged the nuclear power plant if Fukushima, many have been trying to get inside...

Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...

As city centers became more crowded, so did crime become more common. In dealing with rising crime rates in its region, the Orlando City...

You are standing by a white, shiny, family car. This car looks just like the car next door. You are going past a new SUV,...

America’s military planners recognize the growing threat from an EMP attack by bad actors around the world, in particular North Korea and Iran. An EMP...

Top security experts from Israel and foreign countries are gathered in Herzelia today to get updates on the recent technologies that serve perimeter and...