Cyber

Cyber

94
The establishment of a Cyber Directorate in the US Army and a nearly completed strategy are ushering in a more productive era in electronic...

206
The Polish Ministry of Defence is planning to spend more than 61 billion zloty (US $14.5 billion) to acquire new weapons and military equipment...

95
The US and Israel have been increasing cybersecurity cooperation, over the backdrop of the growing threats in the cyber world, including the last attacks...

72
The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...

40
The US Defense Department announced recently that the Pentagon has approved hackers to test the cybersecurity of its public websites without fear of prosecution....

144
Quality learning - this is the moto of the NSG College - National Security Group, that offers security organizations in Israel and all over...

108
Ixia, a provider of network testing, visibility, and security solutions, announced recently that the company’s threat intelligence gateway (ThreatARMOR) will now include cloud-powered centralized...

64
Attivo Networks, an award-winning firm in cyber security threat detection, announced recently that it has been named a Platinum Award winner in American Security...

98
In the contemporary world, characterized by sophisticated  battlefield warfare as well as  dense urban warfare, information and intelligence become a major resource. When the...

114
The leading IoT experts and companies from the IDF and the industries participated at the conference today, organized by iHLS on the Internet of...

144
Cornell researchers have found that like humans, computers based on machine learning can be fooled by optical illusions, which raises security concerns. Cornell graduate student...

82
Vehicle systems store a vast amount of data such as recent destinations, favorite locations, call logs, contact lists, SMS messages, emails, pictures, videos, social...

77
Cyber Security has become a priority in various defense fields. Enhancing the cyber security of nuclear systems has certainly become an imperative. A U.S. Air...

127
A set of strategic principles was issued by the US Department of Homeland Security regarding Internet of Things (IoT) security. The guidelines promote transparency...

68
Germany's cabinet approved a new cyber security strategy due to a growing number of attacks, especially from China and Russia. The strategy calls for the...

109
Researching vehicular cybersecurity and its role in future law enforcement was the focus of the first part of a project carried out as a...

92
Biometrics and IoT (Internet of Things) technologies represent a symbiotic match that together will drive further IoT adoption, according to techzone360.com evaluation. The IoT market...

61
Rostec, the Russian state arms contractor, has launched its own anti-hacking center to deal with attempted cyberespionage attacks, the company’s IT subsidiary RostecInform (RT...

46
According to a report written by the Active Defense Task Force from the George Washington University's Center for Cyber and Homeland Security (CCHS), the...

262
Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to...

iHLS Events