Changing the way business is conducted
THE FREEDOM TO WORK ANY TIME AND ANYWHERE
When we think about the work environment 30 years ago, it seems real changes have occurred since...
More than 1,000 Organizations Join IBM to Battle Cybercrime
Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence
IBM (NYSE: IBM)...
Communicating under water – a revolutionary Israeli development
Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...
Elbit acquires NICE Systems Cyber and Intelligence division
Elbit Systems Ltd. announced today that it has signed an agreement to acquire NICE Systems Cyber and Intelligence division for a total amount of...
Homeland Security seeking off-the-shelf applications to manage biometric data
The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...
Experts from Israel and abroad participate in the Perimeter & off...
Top security experts from Israel and foreign countries are gathered in Herzelia today to get updates on the recent technologies that serve perimeter and...
Video Analytics in the Cyber Age
Figures released by the UN seem to speak for themselves: by 2030, over 60% of global population will reside in urban centers. This development...
INTERPOL 2015 – Israeli innovation, unique solutions and operational experience
Gil Reider, Director of Life Science, Aerospace Defense & HLS Department in the Israel Export and International Cooperation Institute:
"The Israel Export and International Cooperation...
DHS to rely on big data to protect critical infrastructure, networks
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...
Israeli system intercepts cloud-stored data
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...
Home depot all but confirms doozy of a data breach
Home Depot may have experienced a massive security breach, which affected an estimated 110 million people.
Home Depot on Wednesday said it was investigating the possibility,...
Four DARPA projects that could change the world
Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...
“Organizations are surprised to find out how many applications are used...
Good Technologies unveiled a security system for mobile devices.
Gartner declared recently that “MDM is dead” – is this really the situation on the market?...
Israel’s BIG DATA ANALYSIS – Turning a mountain of information into...
The evolving capability to turn 'Big Data' into intelligence in timely and methodical processes enable governments, law enforcement and intelligence agencies to tap new...
Maglan will find the loophole
Israel faces a real risk of a cyber attack on its pipe line systems providing water, chemicals, gas and other substances . Such an...