Big Data

Big Data

Photo illustration US Army - photo by Spc. Paige Behringer, 1BCT, 1st Cav. Div. PAO)

The use of Artificial Intelligence (AI) in the military sphere has been widening in many countries. AI can be defined as a family of...
Photo illus. cyber security by Pixabay

In the 21st century, technology has become an integral part of our lives. We are constantly exposed to it on a daily basis, and...
photo illus. data by Pixabay

The term big data is used to describe a massive amount of distributed data from many different sources and in many different formats. It...
wearable tech

Internet-of-things (IoT) devices are vulnerable to various cyber threats. One of them is the side-channel attack. This tactic seeks to gather secret information by...
Photo illus. Vigilant Guard 2015, South Carolina

Sensors can provide huge amounts of information about an environment. Video from unmanned aerial vehicles (UAVs) and social media posts could provide valuable information...

The US intelligence community has been slow to adopt artificial intelligence/machine learning capabilities to make sense of masses of untapped open-source intelligence (OSINT) data....

Protecting healthcare organizations from cyber-attacks can be a matter of life and death. Healthcare organizations are vulnerable to various cybersecurity threats demanding from them...

By Or Shalom Cyberattacks targeting the health sector have intensified following the COVID-19 crisis. The US Department of Health and Human Services and the Office...

First response and public safety operations have been confronting emerging and continuing threats, such as cyber-attacks and COVID-19 implications. Using data to drive changes in...
data

In military training sessions, simulation tools usually generate a huge volume of data. Accessing training data can benefit senior officials, who can explore where...

The COVID-19 pandemic has accelerated technological adaptation and digital transformation in the public safety sector. Forbes.com recommends paying00 attention to five technological trends to...
forensic

When conducting law enforcement investigations, speed is of the essence. The difference between detecting criminal activity in the digital space in seconds versus hours...
organized crime

Crimes are solved by law enforcement following up on intelligence information from ballistic imaging technology. Who is the shooter and how did they get...

iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event. A large two-day exhibition with national pavilions...
surveillance

Advanced video surveillance capabilities have many applications in business, industry and society in general, and are evident in a major market growth. The global...
photo illus video surveillance by Pixabay

A new event-driven video surveillance software feature will create actionable intelligence for security operations. The new Calipsa Pro Analytics software suite by Calipsa adds...
sensitive data

MIT researchers have released a new search engine that lets someone "Google" a technology's future growth potential, predicting how fast it is advancing. When...
fingerprint

A master database of 21 databases will provide real-time information against terror and crime in India. The long-awaited National Intelligence Grid (NATGRID) will apparently...

The oil and natural gas 00industry worldwide is exposed to increasing cyber threats as this industry is becoming more interconnected. State and criminal actors...

By Or Shalom The planning and application of prison facilities security are complex tasks, due to the wide range of potential threats. These result mainly...

Startup! This is your opportunity to get a $50K grant. If you are developing a groundbreaking technology we invite you to apply to INNOFENSE...
organized crime

With an explosion of data and phone devices and computers in recent years, workloads for law enforcement investigators have grown exponentially, and It’s taking...