Cyber Security

Cyber Security

robots communication

48
A new technology could protect robots communication networks from malicious hackers. Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory and their colleagues present...
cyberthreats

41
The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...
surveillance

90
The new privacy policy announced by Facebook and Instagram bans developers from using their data for surveillance. Following revelations last year that police departments...
cyber

121
In the near future, the cyber industry will have to cope with a wider array of cyber threats and challenges resulting from the vulnerabilities...
Cybersecurity

51
Following the recent New York Times report about what may be the largest leak of C.I.A documents in history on WikiLeaks, Michael Hill, a...
cybersecurity

107
A new cooperation agreement in the cybersecurity for organizations field offers an efficient response to the growing information security challenges. The cybersecurity company Experis Cyber...
cyber security

224
The US intelligence branch has been reinforcing its cyber security array. General Dynamics Information Technology, a business unit of General Dynamics, was awarded a...
cybersecurity services

95
  An IT technology company will provide cybersecurity services to the US Air Force’s Eagle Vision, the only worldwide deployable ground station in the Department...
IoT security

120
The U.S. Department of Homeland Security (DHS) is planning to invest $1 million in five IoT security startups selected through its program Securing the...
cyber

163
The Space and Naval Warfare Systems Command (SPAWAR) rolled out its 2017 strategy. Emphasizing high technology and IT delivery, cyber operations, and optimization of...
digital identity

135
A national digital identity network is to be built in Canada. SecureKey Technologies and a Canadian non-profit coalition have received a grant from a...
cybersecurity

202
A top cyber expert says he expects big changes soon on the US government’s approach on cybersecurity. Retired Lt. Gen. Harry Raduege, who has...
authentication

125
Researchers designed authentication features that will make it more difficult to send out false  signals from the European Galileo satellite The European Union activated its...
big data for homeland security

98
iHLS fifth annual conference on Big Data for Homeland Security attracted many technology experts, investors, entrepreneurs and representatives of the high-tech industries, defense industries,...
cyber

119
  The Russian government has long been known to use criminal hackers for its’ world-class hacking abilities and intelligence gathering. The criminal group most likely...
network

80
A new approach has been offered to securing and protecting defense information networks. The Defense Information Systems Agency (DISA) -- a U.S. Department of...
startup festival

1364
We are delighted to invite you to participate in a unique event and present on our stage your original ideas to investors, customers and...
smartphone secure

61
According to security experts, the popular Pattern Lock system, used to secure millions of Android phones, can be cracked within just five attempts while...
cyber security

74
By Or Yaacov,  EMEA Information Security Solutions Architect, F5 The DDoS attack on the OVH hosting company in September 2016, that used breached IoT devices,...
startup festival

97
If you have an innovative start-up in any field - the iHLS Startup Festival is just for you! Gaming, fintech, big data, nano-technology, cyber, machine...

iHLS Events