Big Data

Big Data

Image sourced by pixabay

The fight against terrorism continues, and this time india is leading the charge. A master database of 21 databases will provide real-time information against terror...
First response. image by pixabay

Sensors can provide huge amounts of information about an environment. Video from unmanned aerial vehicles (UAVs) and social media posts could provide valuable information...
iot. image by pixabay

The industrial and security sectors largely rely on sensors for a vast array of missions, from machine operation control to border security. However, the...
player board. image by

The use of Artificial Intelligence in the military sphere has been widening in many countries. AI can be defined as a family of general-purpose...
Cyber security. image by pixabay

In the 21st century, technology has become an integral part of our lives. We are constantly exposed to it on a daily basis, and...
image by pixabay

AI accelerators are a class of hardware that are designed, as the name suggests, to accelerate AI models. By boosting the performance of algorithms,...
data and cyber. image by pixabay

It is official, the US defense establishment will be focusing their future efforts on data research. The Pentagon is implementing new policies and procedures...
Army. image by pixabay

In the case of spare parts and components, snapping a photo of the part is much more effective than conducting a text search, that...
Cyber space. image by pixabay

The Council of the European Union is on the lookout for secure encryption and lawful data access. The organization has adopted a resolution calling...
Driver on Highway. image by pixabay

Time and again, the protection of data from unauthorized access is proving more and more challenging. One of the most common cyber security problems...
Danger of violence. image by pixabay

Crimes are solved by law enforcement following up on intelligence information from ballistic imaging technology. Who is the shooter and how did they get...
IoT chip. image by pixabay

Internet-of-things devices are vulnerable to various cyber threats. Recent reports suggest that one of those supposed attacks is the side-channel attack. This tactic seeks...
Facial recognition. image by pixabay

The use of live facial recognition (LFR) both in law enforcement and for other purposes is regulated, albeit controversial. Facial recognition technology clearly involves...
Criminal. image by pixabay

When conducting law enforcement investigations, speed is of the essence. The difference between detecting criminal activity in the digital space in seconds versus hours...
Future. image by pixabay

Cybercrime is on the rise, and that isn’t a notion that can be disproven. During the first quarter of 2022 there were 404 publicly...
telecoms. image by pixabay

Fraud has become an ongoing threat and concern for the telecom industry. Approximately 40B$ are lost annually to fraud in telecoms worldwide, and this...

The Israeli company Rafael has unveiled a new long-range strike missile, with built-in autonomous capabilities and a range of 300 kilometers. According to Rafael...
photo illus. data by Pixabay

The term big data is used to describe a massive amount of distributed data from many different sources and in many different formats. It...

The US intelligence community has been slow to adopt artificial intelligence/machine learning capabilities to make sense of masses of untapped open-source intelligence (OSINT) data....

Protecting healthcare organizations from cyber-attacks can be a matter of life and death. Healthcare organizations are vulnerable to various cybersecurity threats demanding from them...

By Or Shalom Cyberattacks targeting the health sector have intensified following the COVID-19 crisis. The US Department of Health and Human Services and the Office...

First response and public safety operations have been confronting emerging and continuing threats, such as cyber-attacks and COVID-19 implications. Using data to drive changes in...