The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...
After years of informally using social networking sites and Internet activity in general to find, monitor and sometimes manipulate terrorist suspects, U.S. SOCOM (Special...
F5 Helps Global Enterprises Counter Online Fraud and Security Attacks
New Security Operations Center improves efficiency, shortens response time, and decreases IT overhead by providing...
Organizations the world over have already been taking into account that Data with a capital D is the organization’s primary asset, and that consequently,...
Gil Reider, Director of Life Science, Aerospace Defense & HLS Department in the Israel Export and International Cooperation Institute:
"The Israel Export and International Cooperation...
The weekly edition issues are :
Hamas claims that Israel has deployed “electronic dragonflies” in Gaza
The U.S has blocked any sales of surplus American-made weapon...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 31st 2015):
Missile Defense: US Unveils Innovative AEGIS System
ISIS Recruiting In New York
The Threat:...
Britain’s cyber unit for soldiers familiar with social media.
Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 17th 2015):
Converted Prop Guns Are Assassins’ Weapon of Choice
Robot Firefighter Puts Out Its...
The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality.
Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...
We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 3rd 2015):
The international campaign against ISIS
Bad Iran Deal in the Offing
Innovative Face Recognition...
A prominent feature of many terrorist attacks in recent months by Islamic radicals is their independent, spontaneous, unplanned nature – sometimes called the work...
Cyber crime, aka e-Crime, presents a highly complex and sophisticated threat that has been evolving rapidly recently. The unfolding legitimate cyber world makes for...