Attend Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishion LeZion West.
Israel is a global leader...
Natural disasters and wide scale emergencies require the cooperation of various agencies and the integration of developing technologies. A recent operational experiment took place,...
Machine learning (ML) has reached a stage of technological development serving diverse applications – from highly efficient manufacturing, medicine and massive information analysis to...
Large drone markets are currently restrained by the complexity of common drone solutions implementation, due to various considerations regarding risk to the public. For...
Increasing risks of cyber attacks pose a challenge for infrastructure security, such as the supply of electricity power, water and transportation. A joint exercise...
Deliveries through drones have many advantages, it can reduce the time, cost and energy needed for everyday deliveries. However, for the purpose, they need...
During a recent demo, an autonomous drone was deployed to map tunnels as small as 3×3 meters, yielding accurate 3D renderings without sending miners...
Private homes can now have autonomous aerial security systems. The system, of Sunflower labs, claims innovation in the field of home security. The system...
Suspected drones become one of the first targets of the military in regions of conflict, due to their surveillance and attack capabilities. Following the...
In the growing marketplace of UAV operators, there is a need for high standards of safety and professionalism. A new certification program available to...
According to Israel's Home Front Command directions: When the siren is sounded or an explosion is heard, enter the protected space within the amount of...
Cyber Security has become a major concern for any large organization or authority operating complex systems.
Rafael Advanced Defense Systems, developer and manufacturer of leading...
A scary yet realistic scenario in the digital age could involve the following: attackers, sponsored by a rogue organization or radical state, gain access...