Cybersecurity in the Workplace
Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...
Deep Fakes and Identity Decentralization
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
New Dangerous Cyberattacks Target AI Systems
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...
Protecting Operation Technologies in Production Lines as a Market Accelerator Trigger...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
Call for Investors
Due to the current security situation, the Technology Innovation Centre is pushing to find investors to support startups participating in its programs.
The participating startups...
Worldcoin Faces Criticism for Dubious Privacy Practices
Worldcoin is a new cryptocurrency company co-founded by OpenAI CEO Sam Altman that requires users to give their iris scans in exchange for a...
Are AI apps Invading Your Privacy?
What is the invisible cost of AI technology? Experts express their worries about privacy breaches.
AI-powered technology is constantly growing, and with it grows the...
Decentralized Storage – A Solution to Cloud-Based Attacks
Nowadays, turning to cloud-based providers for data storage is a common practice of businesses. It offers a convenient and affordable solution, cutting costs of...
Companies Are Not Ready To Face Cyber Threats
Organizations have shifted from a largely static operating model, where people operated from single devices from one location, connecting to a static network, to...
Can Artificial Intelligence Improve Workplace Diversity?
Recruitment tools based on artificial intelligence have become increasingly popular as a method to remove possible discrimination when hiring new employees. Despite its wide...
AI And Security – Higher Level Of Safety
As new technologies and capabilities have emerged in recent years, artificial intelligence and security have become intertwined, leading to a high level of safety.
Artificial...
The Following Industries Are Expected To Profit From Robotic Technologies
We are already living in the future. Our everyday lives are influenced by robots in many ways, whether we're at home or at work....
Why Do Cyber Criminals Target OT Systems?
By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
AI Boxes in Retail Protecting Businesses
Retail companies have begun employing AI boxes as a means of bettering their businesses. These AI boxes can help with many aspects of these...
Autonomous Security Robot Joins a California Company
One of the S&P 500 companies in Southern California has welcomed a new employee - a robot that will be patrolling and securing an...
OT, SCADA – What Does it All Mean?
Industrial machines and devices connected to the network have been gaining momentum and demonstrating effectiveness, however, they are vulnerable to cyberattacks that have far-reaching...
Interested in Fighting COVID-19 Pandemic Effectively and in Real-Time?
The coronavirus pandemic is a global emergency scenario that requires readiness as part of the national preparedness strategy for emergency and crisis situations.
The suitable...
Coronavirus: Recruiting Startup Innovation. IHLS Looking for New Technologies to...
The State of Israel is making all the efforts to block the spread of the coronavirus. Now, iHLS is addressing the technology and startup...
International Cyber Deal Won by Rafael
Managing sensitive financial information and combating cyber threats are imperative for the safety and continuity of financial institutions. One of the major components of...
New Chinese Drone Could Serve Government Agencies
A new Chinese drone known as the ‘Mavic 2 Enterprise’ drone now features swappable search and rescue accessories. The drone was upgraded specifically to...
Your Home Fax Might Help Hackers Take Over Your Network
A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...
C-Level Responsibility for Cybersecurity in Organizations
By Ilan Segelman, Power Communication
The multiple cyber attacks have led to an increasing awareness of the senior executives in organizations to the cyber attacks’...