Encryption

Encryption

hacking

The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
cybersecurity

With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
video streaming

The video and metadata requirements of modern military and defense missions have been evolving rapidly, making live, real-time video delivery and management in the...
cybersecurity law

There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...
communication encryption

The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
IoT security

Recent cybercrime and hacking exploits have shown clearly that much of the IoT – devices, services and applications – is coming online largely in...
iot security

Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
Command and Control Capabilities

  The US Marine Corps has been enhancing its command and control capabilities. Since July 2016, the corps has rolled out 1,100 units of its...
Islamic State

Technologically-advanced Islamist terror groups gain momentum in India. India’s intelligence agencies and state police forces coordinated to bust a hitherto unknown jihadist cell, apparently...
IoT security

The U.S. Department of Homeland Security (DHS) is planning to invest $1 million in five IoT security startups selected through its program Securing the...
threat calls

Federal investigators believe the latest wave of threat calls against Jewish centers and schools around the country was a coordinated attack perpetrated using sophisticated...
smartphone

  The UK military chose the smartphone that warrants the utmost security against malicious actors, for its sensitive communications. The iPhone 7 is being turned into...
digital identity

A national digital identity network is to be built in Canada. SecureKey Technologies and a Canadian non-profit coalition have received a grant from a...
startup festival

We are delighted to invite you to participate in a unique event and present on our stage your original ideas to investors, customers and...
homeland security

The US Department of Homeland Security (DHS) is preparing to utilize Blockchain technology, an approach in technology that replaces data managers with encrypted blocks...

AirMap, a world leader in airspace management for unmanned aircraft, recently announced a partnership with DigiCert that will enable, for the first time, instant...

Europe is preparing for its next Islamic State-inspired terror attack to be carried out by a female assassin after a string of arrests of...

WinMagic Inc., a data encryption firm, announced recently the availability of SecureDoc for Microsoft’s BitLocker, an intelligent key management and encryption solution that improves...
video

Researchers from the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be...

France and Germany are insisting makers of encrypted messaging apps such as Telegram to help governments monitor communications among suspected extremists. Privacy advocates argue that...

A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...