The US Defense Department is reviewing whether cellphones should be banned at the Pentagon - where 23,000 military and civilian personnel work at the...
US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...
What is the connection between big data technologies and business disaster recovery procedures? Disaster recovery and business continuity technologies have come a long way...
Most large organizations have billions of security-related logs per day and security analysts need to be able to automatically and intelligently parse critical data...
By Dorit Guterman, Ledico Security Systems, Tomer Nuri, Team
Information and cyber security events can occur also via security cameras and other IoT devices. As result,...
milCloud is a cloud-services product portfolio, managed by the US Defense Information Systems Agency (DISA) that features an integrated suite of capabilities designed to...
Mobile apps often serve for monitoring and managing machines, and even entire industrial processes. However, the combination of apps and industrial control systems makes...
Researchers evaluate that 99%-plus of the data that the US DoD collects is dark and was never exploited. Artificial intelligence powered by cloud computing...
The recent protests in Iran and the regime’s attempts to block them shed light also on Tehran’s cyber capabilities. Offensive cyber operations have become...
A new beam-switching technology was recently tested proving data transfer and anti-jamming measures between satellites and drones are more successful when two beams are...
Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
The Israeli defense industries have been actively participating in the Make in India initiative launched in 2014 and in other initiatives many years before....