According to the US Department of Homeland Security, the number of investigations into cyber attacks on the America’s critical manufacturing sector nearly doubled last...
Avi Yariv
At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...
By ARIE EGOZI
A big effort is being made to protect the Israeli aviation infrastructure from Cyber attacks.
The threat is real and imminent. A cyber...
Daniel Ehrenreich
Supervisory Control and Data Acquisition (SCADA) experts are well aware that there is no single measure ("no silver bullet") that provides absolute cyber...
The 13 November attacks on Paris have demonstrated that Western countries are not secure against the terrorist threat. One possibility keeping many awake at...
Chinese state-sponsored hacking of US computer networks has been a frequent feature in headlines in recent years. In this case, Chinese cyber attackers have...
For over a week Crimea has been without reliable power supply after explosions damaged pylons and cut off electricity supply from Ukraine.
While the...
Labour’s former Defence Secretary Lord Browne warns of severe risk to Britain’s nuclear deterrent unless “weak spots” are protected. If such security holes as...
Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...
Several high-profile, suspected government-backed cyber attacks on the US might have caused a bit of a shift in the American combat strategy. After countless...
80s films where computers could kill will soon become a reality, judging by a new Pentagon project.
Raytheon, Northrop Grumman and Lockheed Martin are but...
Olga Grosman-Ezrahi
The world is always busy finding solutions for perimeter security, whether it is protecting critical infrastructures, airports etc. During the Video Analytics conference,...
The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...