High Resolution Cameras to Iraq

Iraq is to acquire the ScanEagle unmanned aircraft system (UAS) under a USD8.3 million deal announced by the US Department of Defense (DoD). Institut Inc. has won the US Navy contract to procure support equipment, and support services for the ScanEagle operations for Iraqi armed personnel.

According to the US Department of Defense statement, the company will supply spares, support equipment, and support services for the ScanEagle UAS operations for the government of Iraq intelligence, surveillance, and reconnaissance services program.

 

A US Marine holds a ScanEagle in Iraq.

Work will be performed in Baghdad, Iraq (90 percent); and Bingen, Washington (10 percent), and is expected to be completed in August 2017.

According to Myinform.com, the ScanEagle aircraft is 1.2 m long, has a wingspan of 3 m, and is launched using a pneumatic catapult. It has a service ceiling of 10,000 ft. and an endurance of more than 20 hours. The ScanEagle is equipped with electro-optical, infrared, and high-resolution video cameras that enable the operator to track stationary and moving targets.

A ‘system’ typically comprises multiple air vehicles, as well as associated pneumatic launchers and Skyhook recovery apparatus.

I-HLS:

 

« The 3 Biggest Mistakes in Cybersecurity
The Cyber War Winter Has Arrived »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

aizoOn Technology Consulting

aizoOn Technology Consulting

aizoOn is a technology consulting company offering a range of services including IoT & embedded security, mobile security, cybersecurity assessments, risk & compliance, network monitoring and more.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.