Cyber

Cyber

aircraft systems connectivity

19
The increased scope and complexity of connectivity technology on aircrafts and in aviation infrastructure, such as networked air traffic control systems, makes their operators...
blockchain technology

64
Blockchain technology will help secure unmanned aircraft deliveries. The retail company Wal-Mart recently applied for a patent application entitled “Unmanned aerial delivery to secure...
autonomous vehicles

102
As more technologies are emerging in the field of autonomous vehicles, the assurance of their security has become a major imperative. A new real-time, type...
perimeter security

79
Fiber optic sensing solutions have been used for some time in a wide array of perimeter security applications to detect suspected intrusions. The slightest deviation...
cyber security

97
Asseco Poland is the biggest start-up in Poland, the 6th largest software developer in Europe and has been a leading force in the industry...
US air force

30
The US Air Force is looking for a personal voice assistant for its Air Operations and Combined Air Operations Centers. Would the Air Force...
physical security technology

40
  A new physical security technology has been taking the management of sensors further. Siemens’ Siveillance Viewpoint for physical security information management (PSIM) is part of...

87
Strategic installations and economic infrastructures along the borders, at sea and underwater have been a target of hostile states, terrorist organizations, and other elements....
Israeli cyber group

170
An Israeli cyber group is paying dividends while guarding secrecy concerning its products. NSO Group developed a software which assists governments and security organizations...
big data

130
The proliferation of real-time data from a wealth of sources such as mobile devices, web, social media, sensors, log files and transactional applications, has...
homeland security

43
The US Department of Homeland Security’s Transition to Practice office has helped make dozens of technologies developed by government labs or research partners commercially...
future forces

51
Cutting-edge technological responses to the future warfare challenges will be the focus of the conference on Future Forces that will be hosted by iHLS...
mobile system

46
The US Department of Homeland Security (DHS) has submitted a report to Congress that details current and emerging threats to the Federal government’s use...
cyber attack

152
By Arie Egozi This time the cyber attack was used for extortion. But it may go further, much further and cause huge catastrophes. Hackers exploiting malicious...
smart city

154
The Punjab Information Technology Board (PITB), an autonomous body set by the Government of Punjab (a region partly in North India and partly in...
cyber

39
Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...
electronic warfare

79
The US Army’s Rapid Capabilities Office (RCO) has recently sent its near-term electronic warfare (EW) capability solution to Europe, and soldiers there will get a...
US army

38
  The US Army has been transitioning to cloud technology. Calibre Systems has signed on an army cloud computing enterprise transformation (ACCENT) basic ordering agreement...
Blockchain Cyber Security Tech

221
The security and aerospace company Lockheed Martin has contracted Guardtime Federal to provide blockchain cyber security. Guardtime Federal will be a key supplier to...
new layer of defense for IoT devices

63
A new layer of defense for IoT devices (the Internet of Things) has been announced. With Cloudflare’s Orbit, IoT manufacturers can add security on...

iHLS Events