A report on "Big Data & Data Analytics Market in Homeland Security and Public Safety: 2017-2022" forecasts that this industry's revenues will grow at...
The commercialization of new technologies or products requires experience and expertise. The US Department of Homeland Security's Science and Technology Directorate (DHS S&T) is now...
Securing telephone communication is on the agenda of the US Department of Homeland Security’s (DHS) Science and Technology Directorate (S&T). The organization is “working to...
A new cyber-security system recently developed is based on behavior patterns. Lenvio Inc., a recent cyber security spin-off of R&K Cyber Solutions, has exclusively...
Germany's military, the Bundeswehr, presents a high-value target for hackers and foreign spy agencies – not only because of its military secrets, but also...
Mobile phone apps have increasingly become vulnerable to security breaches. Virginia Tech researchers have recently discovered that the same apps we regularly use on...
Domestic cyber networks in the US need more security to uphold the defense of the nation, says the United States Transportation Command’s (TRANSCOM) leader....
iHLS, the global media leader in security technology, is inviting entrepreneurship in this field, with emphasis on dual-use technology, to join the third cycle of...
Many people are present this morning at the Startup Festival and Startup Live Competition organized by iHLS for the second year.
The first 10 startups...
Augmented reality and virtual reality have the potential to serve as threat modeling tools that could enhance security professionals’ understanding of the threat landscape...
The Israeli Cyber Companies Consortium (IC3) was recently awarded a contract worth tens of millions of dollars to establish a national cyber center in...
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
Israel Aerospace Industries' (IAI) was recently awarded a contract to supply border protection systems in a South American country.
According to the contract worth...
Security vulnerabilities were found at a popular security product. A security researcher has recently published a vulnerability and proof-of-concept exploits in Google's Internet of...
Insider threats constitute a serious challenge to system administrators and IT security teams, as they exist in every company and organization, from small businesses...
Lockheed Martin will support the US Department of Defense's efforts against cyber criminals under a new contract. The company will continue its role as...