Technology

Technology

The use of armed drones in the Middle East, driven largely by sales from China, has grown significantly in the past few years with...
Photo-illust.-US Air-Force-J.M.-Eddins-Jr

One of the U.S. most important asset is vulnerable to cyber attacks. The inadequate cybersecurity practices being used to protect the U.S ballistic missile...

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
iot for security

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...

Swiss academic institutions maintain special relations with the US Defense Advanced Research Projects Agency (DARPA), participating in various projects funded by this American agency....
quantum computing

Several Federal agencies of the U.S. security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in...

A Vertical take-off and landing (VTOL) capability brings aircraft a lot of mobility and convenience, especially in difficult terrain conditions. It enables the UAV...

Saudi oil company Aramco has been the victim of major cases of cyberintrusion and hacking attacks in the past and has sought to shore...

A new unmanned ground vehicle (UGV) built especially for infantry, EOD, and CBRN personnel has been revealed. The lightweight, rugged Scorpion is easy to...

Eye-scanners that detect deception appear to hold much promise, and are faster and cheaper than traditional polygraph tests, for example during employee recruitment processes....

Artificial Intelligence (AI) is already making a significant impact on the field of military and security industries. Extensive funds are being invested in research...

Private homes can now have autonomous aerial security systems. The system, of Sunflower labs, claims innovation in the field of home security.  The system...

With recent and continuing world events regarding non-conventional warfare, the US ability to effectively fight and win in an environment that involves weapons of...

Like any technology, drones are being used for good as well as malevolent purposes. There is a potential threat to transport such as container...

5G technology can be used for espionage purposes. According to David Vigneault, Director of the Canadian Security Intelligence Service (CSIS), 5G can be used...

FLYEYE is a mini Unmanned Air System (UAS), that is used for intelligence, reconnaissance, surveillance and target acquisition (ISTAR) of the battlefield, sensitive areas,...

Detecting small amounts of dangerous nuclear material in one container out of millions is a challenge to security professionals worldwide, as solutions are needed...

New unmanned ground vehicles (UGVs) demonstrated their capabilities during the British Army Warfighting Experiment 2018 (AWE18) — Autonomous Warrior (Land). The main goal of...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...

Microsoft President Brad Smith calls for government regulation on facial-recognition technology. With the aid of smart camera systems governments and companies could track our...

Today, vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) technologies, through which vehicles can communicate with their surroundings, are considered to be the future of safer roads...