Cyber Security

Cyber Security

aircraft systems connectivity

67
The increased scope and complexity of connectivity technology on aircrafts and in aviation infrastructure, such as networked air traffic control systems, makes their operators...
blockchain technology

91
Blockchain technology will help secure unmanned aircraft deliveries. The retail company Wal-Mart recently applied for a patent application entitled “Unmanned aerial delivery to secure...
autonomous vehicles

119
As more technologies are emerging in the field of autonomous vehicles, the assurance of their security has become a major imperative. A new real-time, type...
perimeter security

95
Fiber optic sensing solutions have been used for some time in a wide array of perimeter security applications to detect suspected intrusions. The slightest deviation...
cyber security

111
Asseco Poland is the biggest start-up in Poland, the 6th largest software developer in Europe and has been a leading force in the industry...
US air force

37
The US Air Force is looking for a personal voice assistant for its Air Operations and Combined Air Operations Centers. Would the Air Force...
physical security technology

48
  A new physical security technology has been taking the management of sensors further. Siemens’ Siveillance Viewpoint for physical security information management (PSIM) is part of...

95
Strategic installations and economic infrastructures along the borders, at sea and underwater have been a target of hostile states, terrorist organizations, and other elements....
Israeli cyber group

178
An Israeli cyber group is paying dividends while guarding secrecy concerning its products. NSO Group developed a software which assists governments and security organizations...
big data

138
The proliferation of real-time data from a wealth of sources such as mobile devices, web, social media, sensors, log files and transactional applications, has...
homeland security

58
The US Department of Homeland Security’s Transition to Practice office has helped make dozens of technologies developed by government labs or research partners commercially...
future forces

53
Cutting-edge technological responses to the future warfare challenges will be the focus of the conference on Future Forces that will be hosted by iHLS...
mobile system

48
The US Department of Homeland Security (DHS) has submitted a report to Congress that details current and emerging threats to the Federal government’s use...
cyber attack

163
By Arie Egozi This time the cyber attack was used for extortion. But it may go further, much further and cause huge catastrophes. Hackers exploiting malicious...
smart city

160
The Punjab Information Technology Board (PITB), an autonomous body set by the Government of Punjab (a region partly in North India and partly in...
cyber

42
Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...
electronic warfare

83
The US Army’s Rapid Capabilities Office (RCO) has recently sent its near-term electronic warfare (EW) capability solution to Europe, and soldiers there will get a...
US army

43
  The US Army has been transitioning to cloud technology. Calibre Systems has signed on an army cloud computing enterprise transformation (ACCENT) basic ordering agreement...
Blockchain Cyber Security Tech

228
The security and aerospace company Lockheed Martin has contracted Guardtime Federal to provide blockchain cyber security. Guardtime Federal will be a key supplier to...
new layer of defense for IoT devices

71
A new layer of defense for IoT devices (the Internet of Things) has been announced. With Cloudflare’s Orbit, IoT manufacturers can add security on...
cyber defense

65
More European countries have been widening the scope of their cyber defense operations. Finland has rolled out significant legislative and intelligence facility funding proposals...
cyber

57
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced the transition of a malware detection technology to the commercial marketplace as...

iHLS Events