Encryption

Encryption

innotech

The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
photo illus. cyber by Pixabay

Authentication is one of the core pillars of wireless communications security, along with secrecy and privacy. The value of authentication in a military setting...
photo illus. satellite by Pixabay

The U.S. Space Force has completed upgrades to the Global Position System’s ground segment that will allow it to partially use a new military...
startup accelerator

Are you developing a ground-breaking technology in the fields of unmanned systems, coping with COVID-19 pandemic, counter drones, border security, safe city? We invite you...
quantum computing

Quantum computing is still in a development stage but it is expected to accelerate us into the future by impacting the landscape of artificial...

A think tank urges EU governments to collaborate on a regulatory framework for tighter regulations on money laundering by terrorist organizations. ISIS is using...
cybersecurity

By Or Shalom, security and cyber expert and adviser The establishment of a work plan in the cyber field is not a simple task. Alongside...

The Zoom video conference app has seen a huge rise in downloads since quarantines were imposed around the world. Public Zoom hangouts and working...

Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...

In an internet-connected world where devices are networked, the security of embedded devices is essential, as they are more and more exposed to cyber...
Photo illust. AI by Pixabay

“The race to build next-generation technology is reshaping the contours of global relations.” However, new technologies like artificial intelligence “will neither cause a revolution...
quantum encryption

Quantum cryptography is called the “ultimate code” as it is theoretically impossible to hack. Many countries have been rushing to put quantum cryptography into...
connectivity at battlefield

Connectivity is the name of the game when it comes to coordination and information flow. The US Army’s global network GAIT (Global Agile Integrated...

In most leading security standards used in secure communication methods — from withdrawing cash from the ATM to purchasing goods online on the smartphone...

By harnessing the properties of quantum physics, powerful quantum computers have the potential to sort through a vast number of possibilities in nearly real...
quantum tech for security

Take a closer look at the quantum revolution at the Quantum Tech Conference on November 18, 2019 at the Lago Conference Center, Rishon LeZion. FREE...
Photo illust quntum Pixabay

Take a closer look at the quantum revolution at the Quantum Tech Conference on November 18, 2019 at the Lago Conference Center, Rishon LeZion. FREE...
Photo illust NIST Flickr

Take a closer look at the quantum revolution at the Quantum Tech Conference on November 18, 2019 at the Lago Conference Center, Rishon LeZion. The...
Photo illus Pixabay

The global video surveillance equipment market is expected to grow by $1.7B this year, according to IHS Markit. Undoubtedly, there is a growing demand...

Take a closer look at the quantum revolution at the Quantum Tech Conference on November 18, 2019 at the Lago Conference Center, Rishon LeZion. The...
Photo illustration US Navy

A new technology provides a quick, easy confirmation that the person you’re looking at is the person they say they are.  When the driver,...
smart watch

A new series of smart campus products now support contactless student IDs in Apple Wallet. Allegion, which specializes in seamless access technologies, announced that the...