Infrastructure Security

Infrastructure Security

According to the US Department of Homeland Security, the number of investigations into cyber attacks on the America’s critical manufacturing sector nearly doubled last...

Turkey has been accused by a variety of sources of aiding and abetting ISIS. Some of the accusations include giving medical treatment to ISIS...

The Internet of Things (IoT) is fast becoming an everyday reality, with about half of enterprises set to deploy IoT solutions by the end...

Power plants are some of the most critical bits on infrastructure. An attack against a power plant could incapacitate an entire region of any...

Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

By ARIE EGOZI A big effort is being made to protect the Israeli aviation infrastructure from Cyber attacks. The threat is real and imminent. A cyber...

Daniel Ehrenreich Supervisory Control and Data Acquisition (SCADA) experts are well aware that there is no single measure ("no silver bullet") that provides absolute cyber...

The 13 November attacks on Paris have demonstrated that Western countries are not secure against the terrorist threat. One possibility keeping many awake at...

As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...

  Chinese state-sponsored hacking of US computer networks has been a frequent feature in headlines in recent years. In this case, Chinese cyber attackers have...
video

For over a week Crimea has been without reliable power supply after explosions damaged pylons and cut off electricity supply from Ukraine. While the...

Labour’s former Defence Secretary Lord Browne warns of severe risk to Britain’s nuclear deterrent unless “weak spots” are protected. If such security holes as...

Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...

Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

UAV numbers are growing fast, with different types for a multitude of different uses. Today they range from large MALE and HALE systems (Medium...

Several high-profile, suspected government-backed cyber attacks on the US might have caused a bit of a shift in the American combat strategy. After countless...

80s films where computers could kill will soon become a reality, judging by a new Pentagon project. Raytheon, Northrop Grumman and Lockheed Martin are but...
video

Every time you use the internet - watching videos, sending e-mails, browsing the web - data is being sent and received through an intricate...

Olga Grosman-Ezrahi The world is always busy finding solutions for perimeter security, whether it is protecting critical infrastructures, airports etc. During the Video Analytics conference,...

ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...

The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...