Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...
While Western powers are deeply engaged in debating the merits and dangers of encryption, Kazakhstan is leading the charge in bypassing the security mechanism...
Avi Yariv
At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...
By ARIE EGOZI
A big effort is being made to protect the Israeli aviation infrastructure from Cyber attacks.
The threat is real and imminent. A cyber...
ISIS is known for its advanced application of propaganda techniques, far more so than their predecessors. Ghost Security Group, an online hacktivist collective whose...
Daniel Ehrenreich
Supervisory Control and Data Acquisition (SCADA) experts are well aware that there is no single measure ("no silver bullet") that provides absolute cyber...
The 13 November attacks on Paris have demonstrated that Western countries are not secure against the terrorist threat. One possibility keeping many awake at...
Chinese state-sponsored hacking of US computer networks has been a frequent feature in headlines in recent years. In this case, Chinese cyber attackers have...
Labour’s former Defence Secretary Lord Browne warns of severe risk to Britain’s nuclear deterrent unless “weak spots” are protected. If such security holes as...
Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...
We have written before about China building its own secure smartphone ecosystem - including a homegrown operating system and even processing chips - all...