Cyber Security

Cyber Security

autonomous vehicles

20
Will autonomous vehicles replace humans in the near future? Recent reports of major computer and bitcoin hacks have displayed the vulnerability of modern technologies...
mobile communication

135
The iHLS Security Accelerator is home to many innovative and successful startups. ListenApp is one of the first startups that's participated in the accelerator...
USB-connected devices

64
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
cyber security rules

50
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
cybersecurity platform

8
Recent cyber attacks have increased awareness security on the net. The cyber security market is one of the fastest growing industries in the past...
cyber security

10
  Driverless vehicles will be behind $7 trillion worth of economic activity and new efficiencies annually by 2050. That activity will include nearly $4 trillion...
hacking

10
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
drones

16
Recent years have seen the role of drones in criminal activity increasing significantly. In the area of cyber forensics, law enforcement faces a significant...
artificial intelligence

5
AI (Artificial Intelligence) related methods are being more and more applied in the next wave of cyber security techniques. Whether using deep learning for...
cybersecurity

19
With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
3d printing technology

26
The benefits of 3D printing technology are known, but less frequently discussed are the dangers. The open and accessible nature of the technology means...

16
As IoT matures, applications will be limited only by users’ imaginations. That’s the prediction of Lisa Litherland, a business architect who helps institutions create...
secure authentication

10
As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...
cyber

4
Japan’s Ministry of Defense (MoD) is considering increasing the number of soldiers in its Cyber Defense Unit (CDU) from around 110 to 1,000 and...
israeli air force

7
A unique technological initiative has been taken by the soldiers and graduates of the Israeli Air Force’s Ofek unit on behalf of children with...
accelerator

8
Side by side with the impressive weapon systems presented at the exhibition of the IAMD Missile Defense Conference, the hundreds of visitors had the...
cyber security

5
Not only Russia poses risks to power grid cybersecurity. Small- to mid-size energy companies are facing a variety of threats, says a new report...
electronic warfare

11
The US Army Research Lab has been increasingly focusing on fighting land wars against far more technologically sophisticated adversaries than it has in the...
military cybersecurity

7
Changes are expected in the US military cybersecurity infrastructure. After months of delay, the Trump administration is finalizing plans to revamp US military command...
biometric security

11
Recent years have shown that there are many difficulties in stopping attempts to evade or deceive biometric security systems. For this purpose IARPA’s (The...
cybersecurity law

8
There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...
nuclear plants

16
Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing...

iHLS Events