image provided by pixabay

Are AI apps Invading Your Privacy?

0
What is the invisible cost of AI technology? Experts express their worries about privacy breaches. AI-powered technology is constantly growing, and with it grows the...
image provided by pixabay

Decentralized Storage – A Solution to Cloud-Based Attacks

0
Nowadays, turning to cloud-based providers for data storage is a common practice of businesses. It offers a convenient and affordable solution, cutting costs of...
Image provided by pixabay

Companies Are Not Ready To Face Cyber Threats

0
Organizations have shifted from a largely static operating model, where people operated from single devices from one location, connecting to a static network, to...
Image provided by pixabay

Can Artificial Intelligence Improve Workplace Diversity?

0
Recruitment tools based on artificial intelligence have become increasingly popular as a method to remove possible discrimination when hiring new employees. Despite its wide...
security. image provided by pixabay

AI And Security – Higher Level Of Safety

0
As new technologies and capabilities have emerged in recent years, artificial intelligence and security have become intertwined, leading to a high level of safety. Artificial...
image by pixabay

The Following Industries Are Expected To Profit From Robotic Technologies

0
We are already living in the future. Our everyday lives are influenced by robots in many ways, whether we're at home or at work....
Security. image by pixabay

Why Do Cyber Criminals Target OT Systems?

0
By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
AI. image by pixabay

AI Boxes in Retail Protecting Businesses

0
Retail companies have begun employing AI boxes as a means of bettering their businesses. These AI boxes can help with many aspects of these...
K5 Autonomous Security Robot, Photo: Business Wire

Autonomous Security Robot Joins a California Company

0
One of the S&P 500 companies in Southern California has welcomed a new employee - a robot that will be patrolling and securing an...
SCADA

OT, SCADA – What Does it All Mean?

0
Industrial machines and devices connected to the network have been gaining momentum and demonstrating effectiveness, however, they are vulnerable to cyberattacks that have far-reaching...
coronavirus

Interested in Fighting COVID-19 Pandemic Effectively and in Real-Time? 

0
The coronavirus pandemic is a global emergency scenario that requires readiness as part of the national preparedness strategy for emergency and crisis situations.  The suitable...

Coronavirus: Recruiting Startup Innovation. IHLS Looking for New Technologies to...

0
The State of Israel is making all the efforts to block the spread of the coronavirus. Now, iHLS is addressing the technology and startup...

International Cyber Deal Won by Rafael

0
Managing sensitive financial information and combating cyber threats are imperative for the safety and continuity of financial institutions. One of the major components of...
drone

New Chinese Drone Could Serve Government Agencies

0
A new Chinese drone known as the ‘Mavic 2 Enterprise’ drone now features swappable search and rescue accessories. The drone was upgraded specifically to...
fax

Your Home Fax Might Help Hackers Take Over Your Network

0
A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...
cybersecurity

C-Level Responsibility for Cybersecurity in Organizations

0
By Ilan Segelman, Power Communication The multiple cyber attacks have led to an increasing awareness of the senior executives in organizations to the cyber attacks’...
Drone Pilots

Watch: New Sensor Will Detect Drone Pilots

0
A new sensor called RF-300 was released by Dedrone, that automatically locates drones and their pilots. The current ubiquity of drones makes for a very...
authentication

Selfies to Provide Strictest Level Authentication

0
Cybercrime will become one of the greatest threats of our time, and this is particularly true for banks and insurers, who will increasingly look...
authentication technology

Authentication Technology to Deliver Safer Transactions

0
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...
mapping

New Mapping Solution for Improved Security Surveillance

0
A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...
cyber-defenses

Fostering Cyber-Defenses of Financial Institutions

0
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
cyber

Public Sector Trying to Defend Itself in Cyber Environment

0
Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...

Latest

3D-Printed Antennas Bend Without Breaking the Signal

0
A new type of 3D-printed antenna could transform how vehicles, drones, and wearable devices maintain wireless communication while in motion. Developed by researchers at...