Business Security

Business Security

Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...

Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...

Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

Gad Elkin, EMEA Security Information Director, F5 DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...

In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes. The probe was started in 2011 after John C...

Trend Micro, a global leader in security information solutions, presents its annual security information forecast report. The expected trends include a rise in online...

When the whole world is using the cloud, it comes as little surprise that even the most secured sectors will end up using it...

 Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...

Conductive Composites, a small Utah company, has developed an extremely thin, flexible material, to shield from electronic emissions and electromagnetic pulses. Beyond traditional network-penetration, novel...

Daniel Ehrenreich Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...

The cyberattack on TalkTalk, a telecommunications company in Britain, could be a watershed moment in Islamic State's (Isis) cyberwar against the West, cybersecurity experts...

ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...

TalkTalk, the British telecoms company, has admitted that it has suffered its third major cyberattack in the last 12 months with data from its...

The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...

Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...

The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...

The US, though used to leading in the military and intelligence fronts, has found itself in the past year at a disadvantage when it...