Cyber

Cyber

cyber attack

While cyber attacks often stay at the non-physical cyber world, some of them can attack industrial control systems and cause physical damage. It is...
mobile apps

In emergency and disaster situations, mobile apps and devices enable public-safety professionals to receive and share critical information in real-time, which enhances the delivery...
internet of things

The forthcoming IoT 2017 Conference and Exhibition organized by iHLS will shed light on a lesser-known aspect of the Internet of Things: Security and...
cyber

Israel’s national cyber agencies (the National Cyber Bureau and the National Cybersecurity Authority) will be merged into one entity, the National Cyber Array, which...
dual-use technologies

China will develop high-tech industries with military technologies to boost military-civil integration, in order to cultivate new growth drivers and boost the economy, said...
cyber warfare

NATO recently announced the creation of Cyber Operations Center as part of an overall effort to update and adopt a more expansive and efficient...
ransomware

Rapid technology innovation caused companies across industries to rethink how they leverage digital tools such as artificial intelligence (AI), machine learning, augmented and virtual...
cellular monitoring

Wireless intrusion detection sensors (WIDS) have been approved as Cybersecurity Tools (CST) and are now available on the Department of Defense’s Information Network Approved...
artificial intelligence

Artificial intelligence technology is infiltrating the travel industry, and it’s bringing a host of new conveniences and capabilities with it, from personalized recommendations and...
homeland security market

The Middle East homeland security market is on course for significant growth. A recent study by Analysts Frost & Sullivan (F&S) says revenues are...
smart city

The technological advancements posed by the Internet of Things (IoT) have far-reaching benefits for the cities who adopt them. Smart Cities such as Barcelona,...
cyber-security

If recent years could be defined with one thing, it would probably be the giant technological leap forward. With the benefits come difficulties, and as...
iot security

A new wave of cyberattacks is expected to hit global energy sectors, and the US Department of Homeland Security and the Federal Bureau of...
applications

With surging demand for applications, IT departments are facing increased pressure to deploy them more rapidly, leading to increasing complexity of their infrastructures, and...
iot security

While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
blockchain

Police and security agencies around the world have so far only taken an interest in blockchain – the distributed ledger technology behind cryptocurrencies like...
data

A new technology addresses the physical security threat associated with cybersecurity. Proscreen 500 is an innovative technology that not only provides security against the...
cellphone tracking

Police departments across the USA quietly use a highly secretive technology developed for the military that can track the whereabouts of suspects by using...
big data

The role of big data technologies is to cope with the need to process and analyze vast quantities of unorganized data from a wide...
dual-use technologies

Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...
iot conference

Constantly updating systems capable of confronting the changing threats should be developed, this is one of the recommendations regarding IoT cyber threats, according to...
groundbreaking technologies

We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...

Latest