Cyber

Cyber

autonomous vehicles

While autonomous vehicles real-world tests become more and more prevalent, the risk of hackers taking control of steering and braking systems are real. New...
big data for security

The consequences of the Big Data revolution in all the technological fields and the role of Artificial Intelligence (AI) with this regard were the...
anti-terrorist

Complex challenges are faced by the tech world and governments alike when it comes to terrorists on the internet. Terrorists have been finding new...
big data analytics

Big Data Analytics is helping to quantitatively deal with the information overload, as well as to qualitatively improve intelligence assessments by drawing out patterns...
online terrorism

Online terrorist content has been fueling violent attacks in recent years. For example, ISIS’s recovering media network has been used to call on its supporters...
homeland security

We are inviting ground-breaking startups in the security, defense and homeland security (HLS) fields to take part in a first-of-its kind startup competition. iHLS is...
cyber

The old boundaries of cybersecurity and cyberattacks are disappearing — from the network perimeter, through distinct types of malware, to nation–state tactics vs. that...
kinetic battlefield

When the desired target is not directly reachable over cyberspace, the kinetic engagement by military units equipped with the latest technological and tactical advancements...
cybersecurity

A new cybersecurity intelligence and analytics platform has been unveiled. Tech giant Alphabet, the parent company of Google, formed a security company that uses...
cybersecurity

The digitalization of the energy and infrastructure field in recent years has made it more vulnerable to cyber threats. Providing cybersecurity to critical infrastructure...
big data

Big Data trends shift rapidly, but experts expect some of them to have a big impact on big data projects in the years ahead....
big data startup

Are you a startup with a ground-breaking technology in the Big Data field? iHLS invites you to pitch on a prestigious stage at the...
military installations

The US Defense Department is reviewing whether cellphones should be banned at the Pentagon - where 23,000 military and civilian personnel work at the...
software

US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...
cybersecurity

The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...
startup

Startups!!! If you’ve got a ground-breaking technology in the big data field, iHLS invites you to pitch on a prestigious stage at the conference....
big data

What is the connection between big data technologies and business disaster recovery procedures? Disaster recovery and business continuity technologies have come a long way...
anti terror

Britain has suffered quite a few terror attacks, mainly be Islamist Groups, with one to note is the London Underground attack in 2005. Now,...
big data

Most large organizations have billions of security-related logs per day and security analysts need to be able to automatically and intelligently parse critical data...
video systems

By Dorit Guterman, Ledico Security Systems, Tomer Nuri, Team Information and cyber security events can occur also via security cameras and other IoT devices. As result,...
Biometrics

Things like lightning fast DNA processing, biometrics recognition based on iris scans, thumbprint or voice patterns and video face recognition from vast distances seemed...
Olympics

The Winter Olympics will take place in South Korea during February, and the country is planning to deploy 10,000 police officers in and around...