Technology

Technology

stealth drone

The U.S. military has been using a variety of drones as targets in live-fire exercises. The Pentagon also has deployed drones in combat in...

Transporting personnel and goods like food and equipment to the Antarctic or taking out samples from there are complex tasks. Using larger aircraft can...

Elbit Systems’ Seagull multi-mission Unmanned Surface Vessel (USV) recently completed a series of rigorous sea tests operating the Kraken Robotic Systems Inc.’s KATFISH Synthetic...
drone's role

A new technology may encourage us to think about drones as not just scouts or weapons platforms, but as useful tools. Small bodies that...

An exercise was conducted by the Australian Army with Schiebel’s CAMCOPTER S-100 Unmanned Air System (UAS) to gain further insights into future capabilities and...

The 360-degree camera is a new capability to already proven law enforcement technologies such as in-car cameras. The camera systems first introduced to the...

The use of armed drones in the Middle East, driven largely by sales from China, has grown significantly in the past few years with...
Photo-illust.-US Air-Force-J.M.-Eddins-Jr

One of the U.S. most important asset is vulnerable to cyber attacks. The inadequate cybersecurity practices being used to protect the U.S ballistic missile...

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
iot for security

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...

Swiss academic institutions maintain special relations with the US Defense Advanced Research Projects Agency (DARPA), participating in various projects funded by this American agency....
quantum computing

Several Federal agencies of the U.S. security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in...

A Vertical take-off and landing (VTOL) capability brings aircraft a lot of mobility and convenience, especially in difficult terrain conditions. It enables the UAV...

Saudi oil company Aramco has been the victim of major cases of cyberintrusion and hacking attacks in the past and has sought to shore...

A new unmanned ground vehicle (UGV) built especially for infantry, EOD, and CBRN personnel has been revealed. The lightweight, rugged Scorpion is easy to...

Eye-scanners that detect deception appear to hold much promise, and are faster and cheaper than traditional polygraph tests, for example during employee recruitment processes....

Artificial Intelligence (AI) is already making a significant impact on the field of military and security industries. Extensive funds are being invested in research...

Private homes can now have autonomous aerial security systems. The system, of Sunflower labs, claims innovation in the field of home security.  The system...

With recent and continuing world events regarding non-conventional warfare, the US ability to effectively fight and win in an environment that involves weapons of...

Like any technology, drones are being used for good as well as malevolent purposes. There is a potential threat to transport such as container...

5G technology can be used for espionage purposes. According to David Vigneault, Director of the Canadian Security Intelligence Service (CSIS), 5G can be used...

Latest