cybersecurity

Strategic Collaboration Will Apply Blockchain to Cybersecurity

0
Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
big data

Groundbreaking Big Data Tech Developed by IDF

0
The IDF has been dealing daily with missions involving the extraction of information and insights from large masses of data collected by its vast...
defense data

Leveraging AI to Make Latent Defense Data Usable

0
Researchers evaluate that 99%-plus of the data that the US DoD collects is dark and was never exploited. Artificial intelligence powered by cloud computing...
device encryption

Device Encryption Frustrates Enforcement Agencies

0
The FBI had been unable to access data from 7,775 devices in fiscal year 2017, a growing figure causing setbacks in cases from terrorism...
iot conference and exhibition

IoT Conference and Exhibition – Security Aspects

0
Have you registered for the IoT 2017 Conference and Exhibition?  The event organized by iHLS will be held next Monday, December 25th, 2017 with the attendance of all the...
cyber capabilities

Iran’s Cyber Capabilities Reflect Unique Internal Ecosystem

0
The recent protests in Iran and the regime’s attempts to block them shed light also on Tehran’s cyber capabilities. Offensive cyber operations have become...
iot

What to Expect in 2018 in IoT?

0
As we approach the end of 2017, we begin to ponder what will 2018 look like, technologically speaking. One of the hottest trends today...

Start-Up: Innovative Learning Platform for Security Organizations – NSG College

0
Quality learning - this is the moto of the NSG College - National Security Group, that offers security organizations in Israel and all over...
ransomware

IBM Predicts Ransomware Attacks Against IoT in 2018

0
Rapid technology innovation caused companies across industries to rethink how they leverage digital tools such as artificial intelligence (AI), machine learning, augmented and virtual...
terrorist groups

Do Terrorist Groups Take Advantage of Bitcoin’s Benefits?

0
As the bitcoin concept gains more and more supporters around the globe, there are concerns that this digital currency considered a highly secure method...

Israel – A Cyber Nation

0
לעברית לחץ כאן . Israel is no longer a nation known only for its startup companies but now as a Cyber nation as well.  The government,...
defense industries

Cooperation Accelerates Local Defense Industries

0
The Israeli defense industries have been actively participating in the Make in India initiative launched in 2014 and in other initiatives many years before....

Military Ship Network to Use AI

0
The U.S Navy is about to equip it’s Littoral Combat Ship (a class of relatively small surface vessels intended for operations close to shore)...
smart home

Smart Home is Falling Apart, Would Google Supply Adequate Response?

0
The message heard at the CES 2018 technology exhibition said smart speakers have become available for everyone and are part of daily life. However,...

Future Cyber attacks – this is the shape of things to...

0
The attack came via ordinary email, when selected South Korean companies received messages supposedly containing credit card information in the middle of the week...
satellite-drone communications

New Tech to Enable Better Satellite-Drone Communications

0
A new beam-switching technology was recently tested proving data transfer and anti-jamming measures between satellites and drones are more successful when two beams are...
security flaws

Security Flaws Exposed Threat Personal Info

0
Hackers now have a growing number of avenues by which to access personal information, and securing that information will only become more and more...

Iran: A Global Cyber Threat

0
Iran is investing huge sums of money in developing aggressive cyber war techniques Both government and private cybersecurity experts are increasingly considering Iran as a...
cyber attack

Egozi: The Cyber Attack – It’s Only the Beginning

0
By Arie Egozi This time the cyber attack was used for extortion. But it may go further, much further and cause huge catastrophes. Hackers exploiting malicious...
ihls security accelerator

Security Accelerator’s Innovative Developments Showcased at Missile Defense Conference

0
Side by side with the impressive weapon systems presented at the exhibition of the IAMD Missile Defense Conference, the hundreds of visitors had the...
big data

Are you a Disruptive Big Data Startup?

0
Big data technologies enable us to identify patterns, trends and new details by automatically screening huge amounts of data. In the intelligence, security and...

Does the intelligence community really get Hadoop?

0
The intelligence community is collecting more data than ever. But does that mean the intelligence gleaned from these massive new stores of data is...

Latest

image provided by pixabay

“Responsible AI” – The Solution to the Deepfake Threat?

0
Several months ago, thousands of Democratic New Hampshire voters received a telephone call from none other than US President Joe Biden urging them not...