Business Security

Business Security

cyberthreats

29
The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...

73
The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...

95
Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...

47
  The Internet of Things (IoT) is an innovative field developing rapidly. In daily life it is about connecting computers and various smart devices such...

235
  iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to join the second cycle of the world first accelerator...

101
A new video analytics technology for both security and business, the sMart Data Warehouse, was showcased by Netavis Software at the Security Essen 2016...

183
SWIFT, the global financial messaging system, announced that a few of it's member banks have been attacked by hackers. SWIFT pressured them to comply...

61
With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install...

275
First capital raise by a company participating in the iHLS Startups Accelerator. The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...

130
US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool. As Bitcoin becomes...

256
Before they’ve even started, the Rio Olympics are already plagued with numerous issues jeopardising the security of visitors, players, and residents alike. From the...

129
Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

282
We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...

110
Cloud computing has brought about a new age of convenience. You can store massive amounts of data, share it easily, and most technical aspects...

320
Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...

151
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....

159
iHLS has moved into its offices in Ra’anana this week. Such a move is certainly cause for celebration, especially when the new offices are...

71
North Korea is likely behind another cyber attack on South Korea’s digital infrastructure, United Press International reports. South Korea’s Air Force’s website has been...

140
British defence manufacturer BAE Systems and Japanese technology giant Fujitsu have announced a partnership to develop and implement a Cyber Threat Intelligence (CTI) sharing...

211
The defense sector was not one of the first to move to the cloud, but it seems the revolution has reached it too. The...

iHLS Events