Authentication

Authentication

The manufacturers of connected systems, interested in defending their code and data in the Internet of Things realm will now have another channel to...

Advancing wearable technology for user authentication - that’s the focus of a new mission of the U.S. Army’s tactical network modernization team. “Try to...
safety test for drones

Unmanned aerial vehicles’ remote identification (RID) functionality has become one of three technologies, along with command and control (C2), and Detect and Avoid (DAA),...

In the next decade, technological innovation will have more and more impact on our lives in many fields. Technological innovation opens up new opportunities,...
photo illus. by Pixabay

Deepfakes are fake AI-generated images, footage or voices of real people. They have become a major security threat, and researchers, including many with funding...
blockchain

Blockchain technology will contribute to securing the American dollar. A blockchain initiative to make the US Dollar more like Bitcoin has been funded by...

A think tank urges EU governments to collaborate on a regulatory framework for tighter regulations on money laundering by terrorist organizations. ISIS is using...
cybersecurity

By Or Shalom, security and cyber expert and adviser The establishment of a work plan in the cyber field is not a simple task. Alongside...
biometric

The ubiquity of smartphones combined with the developing trend toward smart living will make biometrics an important element to incorporate into homes of the...

Many people use simple and weak passwords for their devices, making it easy for intruders to hack their phones, computers, emails etc. Many employees...
cybersecurity

During the last few weeks, the media headlines kept us informed about the triple data leak from the Elector application - an app developed...
border control and biometric technologies

Border threats have been creating various challenges, met by innovative control technologies. New systems deliver high security and fast passenger processing times in border...
security camera

A recent spate of breaches involving in-home Ring security cameras, owned by Amazon, in several states across the US have raised concerns that these...
Photo EasySec Solutions at Nimrod Group

Industrial connected devices, the Industrial IoT, is a real opportunity for industries to share efficiently their resources and increase their productivity. However, network sharing...
Photo NSWC Crane Corporate Communications

The rapidly growing world of connected smart devices presents enormous security risks and the existing security solutions find it hard to keep pace. Be...
Blockchain illust Pixabay

The US Department of Homeland Security (DHS) has been pushing for the adoption of blockchain technology in order to enhance the agency’s ability to...
Photo illustration Pixabay

In April 2019, the PDF management service Lumin PDF suffered a data breach. The breach wasn't publicly disclosed until September when 15.5M records of...
Photo illustration US Navy

A new technology provides a quick, easy confirmation that the person you’re looking at is the person they say they are.  When the driver,...
Photo illust US Army, smartphone

How do you translate the powerful consumer technology of smartphones into something that can be useful and secure on the battlefield? Soldiers need something...
photo port illust Pixabay

Increasingly connected and automated vessels are becoming a cybersecurity challenge. In an incident last February, a deep draft vessel on an international voyage sailed...
smart home devices

Some experts expect Earth to pass the threshold of 1 trillion internet-connected sensors within five years, so there is growing pressure to improve the...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...