Technology

Technology

It was a short break. The Homeland Security Department is back to flying UAVs along the country’s borders more than a week after one...

Israeli company Maglan Information Technologies aims to recruit 20 local cyber experts, specializing in controlled infiltrations and advanced cyber attack techniques. Maglan offers information security...

Articles featured in this video: Toothpaste Bombs Threaten Airlines Ahead of Sochi Olympics (link) Russian Air Force Receives Israeli Designed UAV (link) The Robotic Convoys of the...

IBM signed a cooperation agreement with Israeli company Athena, a Mer Group subsidiary. The second international Intelligence Big Data Fusion conference was held last week...

Israel Aerospace Industries (IAI) today revealed its new Super Heron heavy fuel Unmanned Aerial Vehicle (UAV) The Super Heron features a heavy fuel 200 horsepower...

February 1st, 2014 Israel Cyber Park in Beer Sheva expanding One of the biggest network companies, Cisco, will invest millions of dollars in the Israeli cyber industry...

Elbit Systems has unveiled the TREASURES, an unattended ground sensors (UGS) system for intelligence gathering, force and border protection and enhanced situational awareness. The...

The security establishment, the IDF and the Intelligence Corps, in addition to foreign civilian organizations, all use Israeli systems for security and operation of...

Horace Frank, Commander of the LAPD's IT Bureau, told iHLS that during the tour he has seen some unique Israeli tech. "Among the impressive...
National Guard. image by pixabay

Governors across the United States are mobilizing their states’ National Guard units to combat threats from cyberattacks. Terrorists could seriously damage or disrupt states...

THE TAMAM group of Israel Aerospace Industries (IAI) has expanded its offering and fielded a series of new and upgraded stabilized payloads, incorporating significant...

Almost every winter people find themselves in many countries trapped after a snow avalanche. In the search for those buried beneath the snow, every second...

Kelvin Hughes has been contracted by VisSim, a leading VTMS system provider and integrator, to supply a total of 11 SharpEye radar sets for...

Who was behind the largest credit fraud in the history of the U.S, how did hackers infiltrate Ministry of Defense computers and how were...

An iHLS exclusive: LAPD Deputy Chief - “Israel has tech that can be useful for us.” Jose Perez, Deputy Chief of the Los Angeles Police...

The idea is simple: The data is out there, in the virtual world. The challenge collecting the data, understanding it and sharing it with...

Richard Miller, security strategist and privacy consultant for IBM Global Services, is responsible for IBM's Virtual Security Operations Centers (SOC), monitoring clients' networks in...

Advanced, modern systems for port and coastal security have to be capable of detecting infiltration attempts into protected zones – even a lone swimmer...

The EU is considering the mandatory equipping of all cars sold in the union with devices, which would allow police to remotely disable engines,...

Mr. Paul P. Chen is the MILS Senior dirctor and product manager for Wind River, the VxWorks Multiple Independent Levels of Security technology vendor. I...

The NetApp company specializes in dealing with the massive amount of information accumulated by organizations every day, and how to quickly access relevant data. Most...

Interview with Richard Miller, security strategist and privacy consultant at IBM Global Technology, on cyber security. Link to the full interview. Articles featured in this video: The Future...