Security researchers are increasingly seeing in countries outside the West to discover the newest, most creative and potentially most dangerous types of cyberattacks being...
The latest trend in the business and technology worlds, the internet of things (IoT) seems to be everywhere. People and organizations are now demanding...
The Australian Defense Force (ADF) will be working towards the delivery of unmanned platforms for military operations, with an AU$50 million injection from the...
Electricity grid operators in the U.S. experience near constant cyberattacks, with one utility recording approximately 10,000 cyberattacks a month.
Cybersecurity issues can come up...
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
The US NSA wants to make cybersecurity more profitable than cyber attacks. Neal Ziring, the NSA’s Capabilities Directorate technical director said recently: “I want...
The cyber sphere has been gaining increased importance regarding the conduct of states, security organizations and the business realm. The vital need to secure...
U.S. Army trainers have successfully used cyber weapons and electronic warfare (EW) technology to thwart a simulated tank assault at a training exercise. The...
Senior army and technology officials, defense industry leaders and business representatives participated at the conference and exhibition organized by iHLS on offshore & perimeter...
The increased scope and complexity of connectivity technology on aircrafts and in aviation infrastructure, such as networked air traffic control systems, makes their operators...
Blockchain technology will help secure unmanned aircraft deliveries. The retail company Wal-Mart recently applied for a patent application entitled “Unmanned aerial delivery to secure...
As more technologies are emerging in the field of autonomous vehicles, the assurance of their security has become a major imperative.
A new real-time, type...
Fiber optic sensing solutions have been used for some time in a wide array of perimeter security applications to detect suspected intrusions.
The slightest deviation...
A new physical security technology has been taking the management of sensors further. Siemens’ Siveillance Viewpoint for physical security information management (PSIM) is part of...
Strategic installations and economic infrastructures along the borders, at sea and underwater have been a target of hostile states, terrorist organizations, and other elements....
An Israeli cyber group is paying dividends while guarding secrecy concerning its products. NSO Group developed a software which assists governments and security organizations...
The proliferation of real-time data from a wealth of sources such as mobile devices, web, social media, sensors, log files and transactional applications, has...