Cyber Security

Cyber Security

Facial Recognition Can Cause Privacy Problems

In today’s world, almost no one can hide from the authorities. There are cameras everywhere now, and with facial recognition algorithms your face could...
Blockchain System

You may have heard the term "blockchain" used when people talk about cryptocurrencies like bitcoin. If you're unsure of what it means, think of...
authentication

Cybercrime will become one of the greatest threats of our time, and this is particularly true for banks and insurers, who will increasingly look...
accelerator

We at the iHLS Security Accelerator are looking for disruptive ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
autonomous vehicles

While autonomous vehicles real-world tests become more and more prevalent, the risk of hackers taking control of steering and braking systems are real. New...
big data for security

The consequences of the Big Data revolution in all the technological fields and the role of Artificial Intelligence (AI) with this regard were the...
anti-terrorist

Complex challenges are faced by the tech world and governments alike when it comes to terrorists on the internet. Terrorists have been finding new...
big data analytics

Big Data Analytics is helping to quantitatively deal with the information overload, as well as to qualitatively improve intelligence assessments by drawing out patterns...
online terrorism

Online terrorist content has been fueling violent attacks in recent years. For example, ISIS’s recovering media network has been used to call on its supporters...
homeland security

We are inviting ground-breaking startups in the security, defense and homeland security (HLS) fields to take part in a first-of-its kind startup competition. iHLS is...
cyber

The old boundaries of cybersecurity and cyberattacks are disappearing — from the network perimeter, through distinct types of malware, to nation–state tactics vs. that...
kinetic battlefield

When the desired target is not directly reachable over cyberspace, the kinetic engagement by military units equipped with the latest technological and tactical advancements...
cybersecurity

A new cybersecurity intelligence and analytics platform has been unveiled. Tech giant Alphabet, the parent company of Google, formed a security company that uses...
cybersecurity

The digitalization of the energy and infrastructure field in recent years has made it more vulnerable to cyber threats. Providing cybersecurity to critical infrastructure...
big data

Big Data trends shift rapidly, but experts expect some of them to have a big impact on big data projects in the years ahead....
big data startup

Are you a startup with a ground-breaking technology in the Big Data field? iHLS invites you to pitch on a prestigious stage at the...
military installations

The US Defense Department is reviewing whether cellphones should be banned at the Pentagon - where 23,000 military and civilian personnel work at the...
software

US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...
cybersecurity

The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...
startup

Startups!!! If you’ve got a ground-breaking technology in the big data field, iHLS invites you to pitch on a prestigious stage at the conference....
big data

What is the connection between big data technologies and business disaster recovery procedures? Disaster recovery and business continuity technologies have come a long way...
anti terror

Britain has suffered quite a few terror attacks, mainly be Islamist Groups, with one to note is the London Underground attack in 2005. Now,...

Latest