Business Security

Business Security

In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...

The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...

In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

A rogue hacker group managed to penetrate the US Department of Homeland Security (DHS) secure network and make off with a database containing the...

This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...
video

During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...

Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...

Ilan Segelman, VP Sales & Business Development at Power communications and Operation Manager at Sophos Israel We at Sophos believe that there is no such...

Big Data is going open. Open-source, that is. Hadoop and Apache Spark are some of the biggest, hottest technologies in Big Data at this...

AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...

Internet of Things (IoT) connectivity provider Sigfox will team up with GPS supplier Sonsolus and the Belgian government to provide a low-power, ultra-narrow band...

A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. The personal online accounts of James Clapper, director...

Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter. The announcement came...

Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...

Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...

Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

Latest