Israeli counter terror expertise to Kenya

0
Ten Israeli security firms have offered to provide security consultancy, intelligence and counter-terrorism expertise to Kenyan government and private security following a series of...
Production line. image by pixabay

Planning of Cyber BCP In Operational Production Line Sectors

0
Written by Or Shalom  The OT (operational technology) networks present a security challenge for cyber security officials. Such networks are kinetic networks in different sectors,...
innotech conference

Interested in Cyber, HLS, Innovation? Attend INNOTECH 2021 International Event!

0
Attend INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event organized by iHLS. A large two-day exhibition with national pavilions and...

Four DARPA projects that could change the world

0
Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...

Detecting fire in a reliable way

0
  Telefire is equipping many public buildings in different countries with its very advanced fire detectors. The Company's Fire & Gas Detectors plant specializes in developing...

The number of labs handling deadly germs grows, and so do...

0
The number of labs handling dangerous pathogens continues to grow, and so does the number of accidents involving dangerous pathogens. The number of reported accidents...
industrial iot

Smart Communications to Bring Breakthrough in Industrial IoT

0
As we move toward industrial things being digital and connected, putting in place the right communications infrastructure is a critical piece of the Industrial...
image provided by pixabay

iHLS Innovation Centre Calls for Dual-Use Security Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...

Of Cyber And Regulation

0
Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

Living in the future – technology as urban infrastructure

0
Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...

US to Provide Support For Chinese Nuclear Security Training Center

0
U.S. Sandia national labs and their Chinese counterparts have launched the Chinese Center of Excellence (COE) for nuclear security. Homeland Security News Wire reports...

New Israeli Development Protects GPS Devices From Jamming

0
Focus Telecom has launched a revolutionary new cyber product, GPSdome, which protects GPS devices from electronic jamming. The new GPS anti-jamming is designed to...

3D Printing Technology – Advantages and Risks

0
3D printing is a new emerging technology with applications at the civilian and military production. However, it has some cybersecurity and other implications that...

US, Israel to Sign Agreement to Cooperate in Cyber Defense

0
Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...
Image provided by pixabay

Industrial Infrastructure Is Unprepared, Analysis Reveals Deeper Issues  

0
During 2022, we saw a rise in the sophistication and sheer number of attacks targeting industrial infrastructure. At the same time, incident response engagements...

Former Intelligence Senior: “Internet of Things” Increases Threat to Infrastructure

0
A  simple Web search can reveal information from thousands of unsecured devices. Even the casual browser can access camera data from Sweden, video game...

So what is the Duqu2 malware?

0
Earlier this year a new malware was detected in Kaspersky company’s labs which spread and affected the company’s systems. Following this finding, the company launched...

Honey traps for Cyber Hackers

0
An Israeli Start-up company has found a solution to assist companies facing threats of cyber attacks into their databases and using the confidential data...

Security for the security personnel

0
    IMI, Israel military industries, has developed a check-point cubicle, designed to withstand direct hits by Grad missiles. The new portable cubicle is designed for...

Sensors: Critical Necessity For Perimeter Protection

0
There are many systems out there on the perimeter security market, the question is how to best combine them for maximum protection. The first line...
Images provided by pixabay

Chinese Spy Agencies’ Cyberattacks are Getting Bolder

0
Analysts report that cyberattacks linked to Chinese intelligence agencies are rapidly increasing both in frequency and capability, as they seek to test foreign government...

Major Hack in Juniper Networks Equipment

0
US officials are worried that hackers backed by foreign governments were able to spy on communications between the US government and private companies for...

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...