A small Irish software firm, Decisions For Heroes, or D4H, has become central to anti-terror efforts by US authorities. The company’s software has been...
The U.S. Coast Guard receives more than 200 false distress calls a year over its Very High Frequency (VHF) radio channel 16—the mariner’s “911,”—and...
More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
Cyber vulnerabilities have long been acknowledged against commercial maritime vessels, but the targeting of new naval systems – whether for navigation, engine and steering...
Is an extensive cyber attack expected again? The Ukrainian cyber security firm, ISSP, recently announced that it may have detected a new computer virus...
Preparations for the 2017 Trident Warrior exercise, where US sailors are exposed to the newest innovations in naval systems warfare and provide feedback on...
The US intelligence community guards some of the most closely held secrets and helps defend the country from attacks. However, even it needs protection,...
Innovation in biometric identification offer an exciting new frontier in security, with the global biometric system market expected to reach an estimated $32.4 billion...
The Islamic State group and other militant organizations have been creating precedents in terms of discussing cyber activities almost from the start. Most cyber...
The cyber security sphere has become first priority in various organizations, and many resources have been invested in it. But what is the situation...
The developers of the latest technologies in the robotic vehicle and drone field are about to showcase the systems’ advanced capabilities during the unmanned...
The autonomous car revolution taking place right now increases the need to secure these vehicles from any jamming and spoofing of the autonomous navigation....
Today, mathematical algorithms are used to encrypt text messages, banking transactions and health information. Intercepting these encrypted messages requires figuring out the exact algorithm...
Advanced features have been recently introduced into familiar drone models, allowing lower noise flight, increased flight time and more advanced photography capabilities. Drone manufacturer DJI...
Sensitive information conveyed by military mobile communication networks requires high levels of protection. A new cybersecurity software will secure mobile devices in the battlefield....
The digital currency Bitcoin caught the Pentagon’s eyes as a potential cybersecurity shield. The US military has been open about their interest in Blockchain...
By Ilan Segelman
VP Sales & Business Development, Power Communications, and Operation Manager, Sophos Israel
Machine Learning has become a buzzword that many suppliers use as...
When disaster strikes, it’s crucial that first responders have reliable access to a controlled network, allowing them to receive and deliver critical information while...