Infrastructure Security

Infrastructure Security

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) will conduct a week-long airflow study, starting today, in portions of the New...

There are many systems out there on the perimeter security market, the question is how to best combine them for maximum protection. The first line...

The risks of an electromagnetic pulse (EMP) attack simply cannot be overstated. A single powerful charge detonated at a high-enough altitude over the continental...

A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...

Stefanini, one of the most important global providers of business solutions technology, plans to create a joint venture in Brazil with one of the...

There are some big names in the cyber-warfare world: the United States, obviously, as well as Israel, Russia, China, and a few others. In...

MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

When we think about protecting critical infrastructure, we usually imagine cameras, fences, men with guns, and other physical manifestations of security. But experts are...

The United States and Britain are planning a wargame simulating a cyber attack on a nuclear plant later this year. The allies are seeking...

Hackers managed to gain privileged access to a water utility’s control system and change “the levels of chemicals being used to treat tap water,”...

Terrorists have attacked this month the secure BP-Statoil operated In Salah gas facility in Algeria. The attackers fired rockets and RPGs, according to Statoil,...

Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...

By Arie Egozi The indictment against a computer expert of the Islamic Jihad suggests a serious failure and complacency of the IDF and national bodies...

Today critical infrastructures have to simultaneously manage complex facilities, limited resources, answer to government agencies, deal with a growing amount of disparate technologies and...

In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

By Arie Egozi “Big Brother” likes his information in large quantities, but neat so he won’t have any trouble seeing what is important. This is...

Stuxnet, the world-famous computer worm that destroyed Iran’s centrifuges at the Natanz uranium enrichment plant, was only one part of a much larger operation....

With the months long power outage in Crimea, the world saw how easy it is to leave an entire region with no electricity. Attacks...

President Barack Obama’s administration released the presidential Cybersecurity National Action Plan (CNAP) this week. CNAP is an attempt to fix the broken federal information...

Israel Aerospace Industries (IAI) has joined the wide effort to bring to the market an effective system that can detect and foil attacks by...

Israel’s cyber sector is still dominated by startups, despite “growing at a breakneck pace,” according to the folks over at the Defensive Cyber Operations...

Canada and the United States are vulnerable to cataclysmic threat that could “topple the pillar of civilization,” according to Dr Peter Pry, head of...