In today’s world, almost no one can hide from the authorities. There are cameras everywhere now, and with facial recognition algorithms your face could...
We at the iHLS Security Accelerator are looking for disruptive ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
While autonomous vehicles real-world tests become more and more prevalent, the risk of hackers taking control of steering and braking systems are real. New...
Big Data Analytics is helping to quantitatively deal with the information overload, as well as to qualitatively improve intelligence assessments by drawing out patterns...
Online terrorist content has been fueling violent attacks in recent years. For example, ISIS’s recovering media network has been used to call on its supporters...
We are inviting ground-breaking startups in the security, defense and homeland security (HLS) fields to take part in a first-of-its kind startup competition.
iHLS is...
The old boundaries of cybersecurity and cyberattacks are disappearing — from the network perimeter, through distinct types of malware, to nation–state tactics vs. that...
When the desired target is not directly reachable over cyberspace, the kinetic engagement by military units equipped with the latest technological and tactical advancements...
A new cybersecurity intelligence and analytics platform has been unveiled. Tech giant Alphabet, the parent company of Google, formed a security company that uses...
The digitalization of the energy and infrastructure field in recent years has made it more vulnerable to cyber threats. Providing cybersecurity to critical infrastructure...
The US Defense Department is reviewing whether cellphones should be banned at the Pentagon - where 23,000 military and civilian personnel work at the...
US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...
What is the connection between big data technologies and business disaster recovery procedures? Disaster recovery and business continuity technologies have come a long way...