Home Blog Page 148

Comprehensive Security Solution Offered for Railway Operators

0
With rail passenger and freight traffic expected to double by 2050, safety and security expectations for rail organizations are higher than ever, requiring new...
Cybersecurity photo illus. by Pixabay

Remote Work – How to Protect from Cyber Attacks?

0
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently released a draft of its “Zero Trust Maturity Model” as US agencies are asked...

Meet This Remotely Operated Counter-Drone System

0
In recent conflicts, there has been an increase in the usage of drones and loitering munition against various military targets. The employment of this...

US Air Force Has New Target Drone

0
Target drones, also known as UAT (Unmanned Aerial Target), are unmanned vehicles that can be used as bullseye on military trainings and tests thanks...

Advanced Development Approaches Applied in Amphibious Technology

0
Military seaborne operations offer nearly unlimited water landing zones providing significant flexibility. As the US national strategic objectives shift focus to littoral regions, the...

South Korea is Developing Stealth Drone

0
South Korea is developing stealth technology for unmanned aerial vehicles (UAV). Its Agency for Defense Development (ADD) revealed that key technologies for minimizing a...
tactical communication

Military Bases will Be Protected by AI-Based Technology 

0
Artificial intelligence is at the heart of a force protection system for the UK military. Anduril has secured a two-year, $5.2 million contract to...

Abu Dhabi Establishing Pioneering Testing Facility

0
Autonomous drones are already playing a key part in package delivery and infrastructure inspection. As smart cities evolve, it will be critical to ensure...

Interested in Innovation in the IDF? Watch Leading Experts

0
INNOTECH 2021 Cyber, HLS and Innovation event will take place on November 17-18 at Expo Tel Aviv, pavilion 2. Watch last year’s panel on...
fighter aircraft

Unmanned Platform to Accompany Jet Fighters at Battlefield

0
A new autonomous aircraft could become the next-generation of drones that accompany manned planes into battle. Northrop Grumman has unveiled the stealthy jet Model...
yom kippur

iHLS Wishes You Well Over the Fast

0
On Yom Kippur (Day of Atonement), iHLS wishes you and your families well over the fast. G'mar Hatimah Tovah, may you be signed and sealed...

Advanced Technology in Identification Friend-or-Foe Systems

0
Identifying the forces at the battlefield, differentiating friendly forces from the enemy, is a crucial capability. Identification Friend-or-Foe (IFF) systems provide time-critical insights that...
innotech

Register Now to INNOTECH Cyber, HLS and Innovation Event

0
iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event. A giant two-day exhibition with national pavilions...

Dual-Use Technologies – New Regulation

0
In search of a better response to emerging threats, the EU has been looking to gain a better grip on dual-use technologies, including cyber-surveillance...

IAI Unveils New Autonomous System

0
The need to support ground forces in the field to carry out various missions while minimizing threats to soldiers' lives accelerates the development of...

Watch: Successful Demonstration of Maritime Intelligence Tech

0
Advanced maritime information technology was demonstrated successfully in an unmanned aerial vehicle. The trials demonstrated how a navy warship can benefit from the intelligence...
photo illus by pixabay

First of Its Kind US Task Force to Cope with Complex...

0
The growing integration of unmanned systems in military forces requires unique training in manned-unmanned teaming to build trust between the combatants and their robotic...

This New Solar Drone will Remain Airborne for 90 Days

0
The U.S. Navy is developing an uncrewed, solar-powered aircraft known as Skydweller that is designed to remain airborne for 90 days at a stretch....

Securing Detention Facilities and Prisons – Technological Directions and Responses to...

0
By Or Shalom The planning and application of prison facilities security are complex tasks, due to the wide range of potential threats. These result mainly...

Iran Unveiled New Weapon Systems

0
A new surveillance radar, Alborz, and a command-and-control (C2) system, Borhan, were unveiled by the Iranian Army's Air Defense Force. The Army has also...

Alternative Technology for GPS-Denied Navigation

0
As GPS jamming and spoofing continue to rise, interest in complementary sources of positioning, navigation, and timing (PNT) data has likewise increased. Recent US...

Large UAV Collaboration 

0
The “largest-ever” research, design, development, demonstration, test, and evaluation collaboration between the US and Indian militaries has been signed,  According to the Pentagon, the Air...

Latest

Image by Unsplash

Cybercriminals Use Fake AI Tools to Deploy Malware at Scale

0
As the global fascination with generative AI continues to grow, threat actors are seizing the opportunity—this time by weaponizing fake AI video generation tools....