Cyber

Cyber

smart cities

57
Electricity grid operators in the U.S. experience near constant cyberattacks, with one utility recording approximately 10,000 cyberattacks a month. Cybersecurity issues can come up...
soldier systems

30
The US Army has been pushing to make systems more user-friendly to the average soldier in the field. Soldiers will have to operate systems...
cyber-defenses

37
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
communication encryption

84
The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
cybersecurity

62
The US NSA wants to make cybersecurity more profitable than cyber attacks. Neal Ziring, the NSA’s Capabilities Directorate technical director said recently: “I want...
cyber

96
The cyber sphere has been gaining increased importance regarding the conduct of states, security organizations and the business realm. The vital need to secure...
electronic warfare

47
U.S. Army trainers have successfully used cyber weapons and electronic warfare (EW) technology to thwart a simulated tank assault at a training exercise. The...

78
Senior army and technology officials, defense industry leaders and business representatives participated at the conference and exhibition organized by iHLS on offshore & perimeter...
aircraft systems connectivity

68
The increased scope and complexity of connectivity technology on aircrafts and in aviation infrastructure, such as networked air traffic control systems, makes their operators...
blockchain technology

94
Blockchain technology will help secure unmanned aircraft deliveries. The retail company Wal-Mart recently applied for a patent application entitled “Unmanned aerial delivery to secure...
autonomous vehicles

121
As more technologies are emerging in the field of autonomous vehicles, the assurance of their security has become a major imperative. A new real-time, type...
perimeter security

99
Fiber optic sensing solutions have been used for some time in a wide array of perimeter security applications to detect suspected intrusions. The slightest deviation...
cyber security

114
Asseco Poland is the biggest start-up in Poland, the 6th largest software developer in Europe and has been a leading force in the industry...
US air force

39
The US Air Force is looking for a personal voice assistant for its Air Operations and Combined Air Operations Centers. Would the Air Force...
physical security technology

50
  A new physical security technology has been taking the management of sensors further. Siemens’ Siveillance Viewpoint for physical security information management (PSIM) is part of...

98
Strategic installations and economic infrastructures along the borders, at sea and underwater have been a target of hostile states, terrorist organizations, and other elements....
Israeli cyber group

182
An Israeli cyber group is paying dividends while guarding secrecy concerning its products. NSO Group developed a software which assists governments and security organizations...
big data

141
The proliferation of real-time data from a wealth of sources such as mobile devices, web, social media, sensors, log files and transactional applications, has...
homeland security

60
The US Department of Homeland Security’s Transition to Practice office has helped make dozens of technologies developed by government labs or research partners commercially...
future forces

54
Cutting-edge technological responses to the future warfare challenges will be the focus of the conference on Future Forces that will be hosted by iHLS...
mobile system

50
The US Department of Homeland Security (DHS) has submitted a report to Congress that details current and emerging threats to the Federal government’s use...
cyber attack

167
By Arie Egozi This time the cyber attack was used for extortion. But it may go further, much further and cause huge catastrophes. Hackers exploiting malicious...

iHLS Events