Cyber Security

Cyber Security

software

A small Irish software firm, Decisions For Heroes, or D4H, has become central to anti-terror efforts by US authorities. The company’s software has been...
voice recognition

The U.S. Coast Guard receives more than 200 false distress calls a year over its Very High Frequency (VHF) radio channel 16—the mariner’s “911,”—and...
ihls security accelerator

Are you developing an innovative product? We can offer you added value in the security market as well. At the iHLS Security Accelerator, we...
blockchain

More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
artificial intelligence

How can you guess a password in an efficient way? A new application of artificial intelligence and deep learning in the field of information...
cyber

Cyber vulnerabilities have long been acknowledged against commercial maritime vessels, but the targeting of new naval systems – whether for navigation, engine and steering...
cyber

Is an extensive cyber attack expected again? The Ukrainian cyber security firm, ISSP, recently announced that it may have detected a new computer virus...
naval systems

Preparations for the 2017 Trident Warrior exercise, where US sailors are exposed to the newest innovations in naval systems warfare and provide feedback on...
intelligence

The US intelligence community guards some of the most closely held secrets and helps defend the country from attacks. However, even it needs protection,...
cyber security

India has been advancing one more stage on the way to mobile phone cyber security. The Indian government is finalising cyber security standards to...
biometric identification

Innovation in biometric identification offer an exciting new frontier in security, with the global biometric system market expected to reach an estimated $32.4 billion...
ISIS

The Islamic State group and other militant organizations have been creating precedents in terms of discussing cyber activities almost from the start. Most cyber...
cyber security

The cyber security sphere has become first priority in various organizations, and many resources have been invested in it. But what is the situation...
casualty evacuation

The developers of the latest technologies in the robotic vehicle and drone field are about to showcase the systems’ advanced capabilities during the unmanned...
autonomous car

The autonomous car revolution taking place right now increases the need to secure these vehicles from any jamming and spoofing of the autonomous navigation....
secure communication

Today, mathematical algorithms are used to encrypt text messages, banking transactions and health information. Intercepting these encrypted messages requires figuring out the exact algorithm...
drone

Advanced features have been recently introduced into familiar drone models, allowing lower noise flight, increased flight time and more advanced photography capabilities. Drone manufacturer DJI...
emergency

Apple's new operating system will come with an option to lock your iPhone's fingerprint scanner and bring up a hotline to the police. The...

Sensitive information conveyed by military mobile communication networks requires high levels of protection. A new cybersecurity software will secure mobile devices in the battlefield....
blockchain

The digital currency Bitcoin caught the Pentagon’s eyes as a potential cybersecurity shield. The US military has been open about their interest in Blockchain...
information security

By Ilan Segelman VP Sales & Business Development, Power Communications, and Operation Manager, Sophos Israel Machine Learning has become a buzzword that many suppliers use as...
cloud computing

When disaster strikes, it’s crucial that first responders have reliable access to a controlled network, allowing them to receive and deliver critical information while...