Networking

Networking

cybersecurity

A new US intelligence assessment claims that over the course of the next 20 years, nation-states will see a rise in targeted offensive cyber-operations...
Photo-illust.-Abrams-tank-US-Marine-Corps-Wikimedia

The top part of tanks and other armored vehicles is generally their most vulnerable area. This is the reason why the U.S. Army is...
law enforcement camera

Video serves as a crucial piece of evidence for law enforcement while also serving as an essential ingredient for building trust and transparency with...

In recent years, the digital and multi-dimensional aspects have become an essential component of IDF’s military concept, and numerous operations involve aerial vehicles, maritime...

Although each of the US military services - Army, Navy, Air Force, Marines, and Coast Guard - has different tasks, they all have to...

While market forecasts paint a rosy picture of smart city investment, many municipalities around the world are slashing their budgets as the economic fallout...
military cloud computing

As military operations become increasingly data-driven, access to critical data and applications is a crucial requirement for the armed forces.  For the armed forces, access...

Most of all, firefighters need situational awareness and communication capabilities to mitigate fires effectively and safely. A new technology - the Team Awareness Kit,...
robotics

Robotics, autonomy and artificial intelligence will change the character of warfare in coming decades. The US Army is ramping up investments in robotic systems...

The US Coast Guard needs higher Interoperability and networking levels. Modern threat environments require more dispersed, yet interoperable mission tasks, a dual-pronged tactical approach...
Silverfort, photo illus. network cyber by Pixabay

Accelerated technological changes have created a complex challenge to enterprise cybersecurity. Until not long ago, enterprise networks had a clear and protected perimeter with...
satellite-based solution

A recent European initiative is expected to provide secure connectivity for citizens, commercial enterprises, and public institutions, as well as providing global coverage for...

Physical security technologies for public buildings have advanced considerably, moving away from legacy standalone CCTV systems to modern digital video surveillance technologies. However, security...

2020 has been a challenging year from the point of view of cybersecurity, with many organizations reacting to the unexpected impact of the COVID-19...
v2x

The signs for the revolution in the automotive communications world are already evident. The technology that allows vehicles to directly communicate with each other,...

“Mekorot, Israel’s national water company, is the target of approximately half a million attacks per year,” says David Balsar, General Manager Innovation, and Ventures....
5g drone

The transition from simple machine-to-machine (M2M) connections to the complex Internet of Things (IoT) is already underway. Massive IoT is a category driven by...
first responders communication

In emergency situations, whether it is a mass school shooting attack or a search for survivors following an earthquake, every second has critical consequences,...

Efforts to trace the exact location of people have not started with the intensive attempts by states to stop the spread of the COVID-9...

The INNOTECH International Live Conference Broadcast for HLS, Cyber, and Innovation on December 8-9 will host the leading experts at the intriguing panel discussion....

By Or Shalom, security and cyber expert and adviser OT environments are computing networks characterized by computerized processes operations and command & control, therefore they...
police car

For all of their benefits, modern communications and information sharing systems have never been well-suited for single occupant vehicle operations, as they sometimes require...