Cyber

Cyber

malware

Security researchers are increasingly seeing in countries outside the West to discover the newest, most creative and potentially most dangerous types of cyberattacks being...
smart cities

The latest trend in the business and technology worlds, the internet of things (IoT) seems to be everywhere. People and organizations are now demanding...
securing sporting events

Predictive technology will play a vital role in securing future major sport events. During a keynote speech on smart cities and the future of...
unmanned platforms

The Australian Defense Force (ADF) will be working towards the delivery of unmanned platforms for military operations, with an AU$50 million injection from the...
smart cities

Electricity grid operators in the U.S. experience near constant cyberattacks, with one utility recording approximately 10,000 cyberattacks a month. Cybersecurity issues can come up...
soldier systems

The US Army has been pushing to make systems more user-friendly to the average soldier in the field. Soldiers will have to operate systems...
cyber-defenses

The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
communication encryption

The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
cybersecurity

The US NSA wants to make cybersecurity more profitable than cyber attacks. Neal Ziring, the NSA’s Capabilities Directorate technical director said recently: “I want...
cyber

The cyber sphere has been gaining increased importance regarding the conduct of states, security organizations and the business realm. The vital need to secure...
electronic warfare

U.S. Army trainers have successfully used cyber weapons and electronic warfare (EW) technology to thwart a simulated tank assault at a training exercise. The...

Senior army and technology officials, defense industry leaders and business representatives participated at the conference and exhibition organized by iHLS on offshore & perimeter...
aircraft systems connectivity

The increased scope and complexity of connectivity technology on aircrafts and in aviation infrastructure, such as networked air traffic control systems, makes their operators...
blockchain technology

Blockchain technology will help secure unmanned aircraft deliveries. The retail company Wal-Mart recently applied for a patent application entitled “Unmanned aerial delivery to secure...
autonomous vehicles

As more technologies are emerging in the field of autonomous vehicles, the assurance of their security has become a major imperative. A new real-time, type...
perimeter security

Fiber optic sensing solutions have been used for some time in a wide array of perimeter security applications to detect suspected intrusions. The slightest deviation...
cyber security

Asseco Poland is the biggest start-up in Poland, the 6th largest software developer in Europe and has been a leading force in the industry...
US air force

The US Air Force is looking for a personal voice assistant for its Air Operations and Combined Air Operations Centers. Would the Air Force...
physical security technology

  A new physical security technology has been taking the management of sensors further. Siemens’ Siveillance Viewpoint for physical security information management (PSIM) is part of...

Strategic installations and economic infrastructures along the borders, at sea and underwater have been a target of hostile states, terrorist organizations, and other elements....
Israeli cyber group

An Israeli cyber group is paying dividends while guarding secrecy concerning its products. NSO Group developed a software which assists governments and security organizations...
big data

The proliferation of real-time data from a wealth of sources such as mobile devices, web, social media, sensors, log files and transactional applications, has...