Most Cyber Products Will Not Be Included Under New Supervision Law
                About two weeks after publishing the draft of the export law for supervision on cyber export, and as part of the talks between exporters...            
            
        This Electronic Chip Will Self Destruct in…
                A new chip built on strained glass can shatter within 10 seconds when remotely triggered. Such technology could prove tremendously useful for the U.S....            
            
        The Secrets of Security Video Analytics
                Due to improvements in the field, the demands of connected cameras today are increasing.
One of the technologies that security cameras offer us today is...            
            
        INNOFENSE Call for startups – Dual-Use Technologies
                iHLS and the Ministry of Defense invite you to join the fifth cycle of INNOFENSE and receive a remarkable opportunity to showcase your technology...            
            
        Start-Up: Cyber Security Software from Hardware Point of View
                It's no news that today institutes from all sectors, international banks to hospitals, are seeking for a complete cyber defense layer. Cyber DriveWare, which...            
            
        The Robot at your side may kill you
                The rush to automate more factory processes may look like it’s saving money, but to Ken Westin, a senior security analyst at Tripwire, it’s...            
            
        Day After Cyber Agreement: China Attacks
                Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...            
            
        Israel: An Exemplar Of Cyber Development For The World Economic Forum
                During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...            
            
        New Cargo Radiation Detection Technology
                Seaports customs and security professionals might sometimes miss contraband attempts, including radiological materials. The problem was hightened during a US congressional hearing, when officials...            
            
        “Movie-Style” Surveillance and Operations vehicles
                
You are standing by a white, shiny, family car. This car looks just like the car next door.
You are going past a new SUV,...            
            
        New Study Reveals How Encrypted Robot Commands Can Still Leak Sensitive...
                As collaborative robots become more common across healthcare and industrial environments, new research highlights a critical gap in how these systems handle privacy—even when...            
            
        New Detection Solution Against Malicious Drones
                As drones become more prominently used, so does the misuse of these emerging technologies. New drone detection solution could protect military bases, venues, cities...            
            
        Predictive Maintenance Using the Power of Satellites
                Study reveals that SAR satellite data can provide early detection of infrastructure issues and help prevent further damage to roads, like an annual health...            
            
        Leading Industry Experts at the Offshore & Perimeter Security Conference
                Leading experts from Israel and the world in the field of perimeter & offshore security are participating in the conference taking place today today...            
            
        The U.S energy sector under Cyber attacks
                The energy sector is reporting an enormous increase in the number of attempted cyber attacks in 2013, according to a new report from the Department of...            
            
        Are There Solutions For Continuous Cyber Attacks?
                The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...            
            
        Falling Behind in the Cyber War
                By Rachel Ehrenfeld
Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...            
            
        EMP Could Toast Electrical Grid (And How To Protect Against It)
                Canada and the United States are vulnerable to cataclysmic threat that could “topple the pillar of civilization,” according to Dr Peter Pry, head of...            
            
        Iran Is Challenging IoT Security
                As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...            
            
        U.S. responds to cyber threats.
                U.S. Army War College in Carlisle, Pa. has grouped together the best minds on cyber in order to brainstorm and create a new defense...            
            
        Explosive Environments – the Israeli Challenge
                By Ilan Cohen, ITL CTO
Two decades ago Israel was not a player in the explosive environment arena. There was some minimal activity in the...            
            
        New Mapping Solution for Improved Security Surveillance
                A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...            
            
        
 
            
