Big Data

Big Data

The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...

Experts: ISIS's social media terrorist messaging far ahead of US government efforts to counter it. The U.S. government is a doing a feeble job of...

The need for cybersecurity solutions and experts is going to grow as more companies such as Sony Pictures, Target, Home Depot, and Chase are...

After years of informally using social networking sites and Internet activity in general to find, monitor and sometimes manipulate terrorist suspects, U.S. SOCOM (Special...

The US electrical grid remains alarmingly vulnerable to a variety of cyber threats. Judging by the number and type of cyber incidents reported to...

F5 Helps Global Enterprises Counter Online Fraud and Security Attacks New Security Operations Center improves efficiency, shortens response time, and decreases IT overhead by providing...

Figures released by the UN seem to speak for themselves: by 2030, over 60% of global population will reside in urban centers. This development...

Organizations the world over have already been taking into account that Data with a capital D is the organization’s primary asset, and that consequently,...

  Gil Reider, Director of Life Science, Aerospace Defense & HLS Department in the Israel Export and International Cooperation Institute: "The Israel Export and International Cooperation...
video

iHLS TV Weekly Video Report : Barak – 8 the main weapon system onboard the Israeli navy’s new ships. 60.7% of all exported unmanned aircraft in...
video

  The weekly edition issues are : Hamas claims that Israel has deployed “electronic dragonflies” in Gaza The U.S has blocked any sales of surplus American-made weapon...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 31st 2015): Missile Defense: US Unveils Innovative AEGIS System ISIS Recruiting In New York The Threat:...

So far, the rising budgets on Data Security do not seem to inspire greater confidence in the results. A new report looking at how organizations...

Britain’s cyber unit for soldiers familiar with social media. Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 17th 2015): Converted Prop Guns Are Assassins’ Weapon of Choice Robot Firefighter Puts Out Its...

The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...

A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...

Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality. Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...

We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 3rd 2015): The international campaign against ISIS Bad Iran Deal in the Offing Innovative Face Recognition...

A prominent feature of many terrorist attacks in recent months by Islamic radicals is their independent, spontaneous, unplanned nature – sometimes called the work...

Cyber crime, aka e-Crime, presents a highly complex and sophisticated threat that has been evolving rapidly recently. The unfolding legitimate cyber world makes for...

Latest