More

    Defense & Security

    Robotics and AI play a critical role in defense and cybersecurity, from autonomous surveillance systems to AI-driven threat detection. Discover innovations that enhance security and operational readiness.

    robot-safety

    Robot safety – Top safety solutions for robotic workstations

    0
    Human safety is one of the most critical aspects of designing a robotic workstation that involves human-robot interactions (HRI). Robots manipulate dangerous tools and...

    How can small businesses level up their cybersecurity?

    1
    Starting a small business today might be easy for anyone out there, but this doesn’t mean that running it will be effortless! There are many...
    drones

    Armed drones for national defence and security – Pros and cons

    0
    Drones, also known as Unmanned Aerial Vehicles (UAVs), Remotely Piloted Vehicles (RPVs), or Remotely Operated Aircraft (ROAs), play a prominent role in military operations,...
    ransomware

    8 most popular ransomware against high-profile business targets

    0
    One of the earlier cases of ransomware infection was first reported in Russia between 2005 and 2006. Since then, ransomware has rapidly become one...
    drone4

    Game of drones: Big security and privacy threats and concerns

    0
    Ever since the first commercial drone was demonstrated at the Consumer Electronics Show (CES) in 2010, drones or unmanned aircraft systems (UAS) have shown...
    ransomware

    Mitigating ransomware attacks at your business – A complete guide

    0
    Among all the malware that attacks people's data, ransomware happens to be one of the worst! Its impact is immediate and can result in...
    vpn

    How Virtual Private Networks (VPN) create big holes in your cybersecurity

    0
    Have you ever wondered what the digital world is like today? It is the hub of all knowledge, but yet, it comes with many...
    Lucas Le Bell, CEO of CHIMERA

    Anti-drone systems: Interview with Lucas Le Bell, CEO of CERBAIR

    0
    The use of drones or unmanned aerial vehicles (UAVs) generates heavy deliberation and debate over the malicious uses of the technology, which can potentially...
    brute-force attacks

    How to prevent brute-force attacks on Remote Desktop Protocol (RDP)

    0
    The number of people working from home has risen astronomically this year due to COVID-19. Consequently, numerous companies have been reliant on remote desktop...
    connected-cars

    Top security risks of dedicated short-range communication (DSRC)

    0
    Most modern vehicles use dedicated short-range communication (DSRC) technologies to enable reliable and very high data transmission between vehicle-based devices and active safety applications...
    autonomous-vehicle

    Hacking an autonomous vehicle – Common attacks and vulnerabilities

    0
    Autonomous vehicles (AVs) incorporate several key technologies to enable driverless, safe, and efficient transportation. They use sensor technology and advanced driver assistance systems to...
    biometric

    Six emerging biometric technologies – Pros and cons

    0
    For thousands of years, we have been identifying our fellow human beings based on their voice, appearance, or gait. However, a scientific and systematic...