Infrastructure Security

Infrastructure Security

cybersecurity

The digitalization of the energy and infrastructure field in recent years has made it more vulnerable to cyber threats. Providing cybersecurity to critical infrastructure...
counter-UAS system

A counter-UAS system can be used to detect, track, mitigate or classify a small UAS (SUAS). The use of SUASs for both legitimate and...
military installations

The US Defense Department is reviewing whether cellphones should be banned at the Pentagon - where 23,000 military and civilian personnel work at the...
software

US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...

The threat posed by drones against critical infrastructure has become more and more widespread. The recent attack against Russian forces in Syria is only...
anti terror

Britain has suffered quite a few terror attacks, mainly be Islamist Groups, with one to note is the London Underground attack in 2005. Now,...
Biometrics

Things like lightning fast DNA processing, biometrics recognition based on iris scans, thumbprint or voice patterns and video face recognition from vast distances seemed...
crowd management

India will use drones for both crowd management and infrastructure inspection. As one of the most populous countries in the world, India is interested...
anti-ram fences

Terrorist vehicle attacks in various cities around the world during recent years have emphasized the urgent need in the development of defense systems. Anti-crash...
mobile app

Mobile apps often serve for monitoring and managing machines, and even entire industrial processes. However, the combination of apps and industrial control systems makes...
intrusion detection

An advanced perimeter security system has been recently certified by the US Air Force. The fence-mounted system detects and locates any attempt to cut,...
patrol robot

A new patrol robot with artificial intelligence capabilities leverages the proven Segway mobility platform in operating various security missions. The robot is equipped with...

Most commercial multicopter drones boast flight times of 25 to 30 minutes. Now, drone manufacturer Quaternium is claiming a new milestone in this field,...
drone

A new rugged autonomous drone with Artificial Intelligence (AI) capabilities was developed by an Israeli tech company to advance security missions with real-life applications. Percepto...
drone threat

There are growing concerns in the US that terrorists and spies could use remotely piloted unmanned aircraft for surveillance, espionage and attacks, from monitoring...
infrastructure inspection

New autonomous solar-powered blimps will be used to collect long-distance aerial data. Mothership Aeronautics will build and deploy its new TerraSoar Aerial Intelligence Airship. TerraSoar’s...
video analytics

An increasing interest in video analytics was demonstrated in 2017 from commercial industries using the technology for business operations, yet the security industry remains...
cyber attack

While cyber attacks often stay at the non-physical cyber world, some of them can attack industrial control systems and cause physical damage. It is...
cyber

Israel’s national cyber agencies (the National Cyber Bureau and the National Cybersecurity Authority) will be merged into one entity, the National Cyber Array, which...
rail industry

Various security monitoring applications used in the rail industry require individual systems, creating expensive and complex integrations for surveillance centres. Moreover, installations tend to...
homeland security market

The Middle East homeland security market is on course for significant growth. A recent study by Analysts Frost & Sullivan (F&S) says revenues are...
iot security

A new wave of cyberattacks is expected to hit global energy sectors, and the US Department of Homeland Security and the Federal Bureau of...

Latest