Big Data

Big Data

Cyber space. image by pixabay

The Council of the European Union is on the lookout for secure encryption and lawful data access. The organization has adopted a resolution calling...
Driver on Highway. image by pixabay

Time and again, the protection of data from unauthorized access is proving more and more challenging. One of the most common cyber security problems...
Danger of violence. image by pixabay

Crimes are solved by law enforcement following up on intelligence information from ballistic imaging technology. Who is the shooter and how did they get...
IoT chip. image by pixabay

Internet-of-things devices are vulnerable to various cyber threats. Recent reports suggest that one of those supposed attacks is the side-channel attack. This tactic seeks...

The Israeli company Rafael has unveiled a new long-range strike missile, with built-in autonomous capabilities and a range of 300 kilometers. According to Rafael...
photo illus. data by Pixabay

The term big data is used to describe a massive amount of distributed data from many different sources and in many different formats. It...

The US intelligence community has been slow to adopt artificial intelligence/machine learning capabilities to make sense of masses of untapped open-source intelligence (OSINT) data....

Protecting healthcare organizations from cyber-attacks can be a matter of life and death. Healthcare organizations are vulnerable to various cybersecurity threats demanding from them...

By Or Shalom Cyberattacks targeting the health sector have intensified following the COVID-19 crisis. The US Department of Health and Human Services and the Office...

First response and public safety operations have been confronting emerging and continuing threats, such as cyber-attacks and COVID-19 implications. Using data to drive changes in...
data

In military training sessions, simulation tools usually generate a huge volume of data. Accessing training data can benefit senior officials, who can explore where...
player board. image by

The use of Artificial Intelligence in the military sphere has been widening in many countries. AI can be defined as a family of general-purpose...

iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event. A large two-day exhibition with national pavilions...
surveillance

Advanced video surveillance capabilities have many applications in business, industry and society in general, and are evident in a major market growth. The global...
photo illus video surveillance by Pixabay

A new event-driven video surveillance software feature will create actionable intelligence for security operations. The new Calipsa Pro Analytics software suite by Calipsa adds...
sensitive data

MIT researchers have released a new search engine that lets someone "Google" a technology's future growth potential, predicting how fast it is advancing. When...

The oil and natural gas 00industry worldwide is exposed to increasing cyber threats as this industry is becoming more interconnected. State and criminal actors...

By Or Shalom The planning and application of prison facilities security are complex tasks, due to the wide range of potential threats. These result mainly...

Startup! This is your opportunity to get a $50K grant. If you are developing a groundbreaking technology we invite you to apply to INNOFENSE...
organized crime

With an explosion of data and phone devices and computers in recent years, workloads for law enforcement investigators have grown exponentially, and It’s taking...

New technology is expected to advance cloud computing capabilities in the low earth orbit (LEO). Objects in low-earth orbit are at an altitude of...

The US military has long used biometric devices in the global war on terror. But following the US withdrawal from Afghanistan, there are concerns...