Business Security

Business Security

mapping

3
A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...
cyber-defenses

59
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
cyber

44
Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...
situational awareness

51
  A new security system which brings together up-to-the-minute information on key security developments in Iraq and the implications for companies operating in the region...
cyberthreats

57
The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...

112
The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...

129
Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...

75
  The Internet of Things (IoT) is an innovative field developing rapidly. In daily life it is about connecting computers and various smart devices such...

262
  iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to join the second cycle of the world first accelerator...

125
A new video analytics technology for both security and business, the sMart Data Warehouse, was showcased by Netavis Software at the Security Essen 2016...

203
SWIFT, the global financial messaging system, announced that a few of it's member banks have been attacked by hackers. SWIFT pressured them to comply...

82
With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install...

338
First capital raise by a company participating in the iHLS Startups Accelerator. The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...

163
US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool. As Bitcoin becomes...

284
Before they’ve even started, the Rio Olympics are already plagued with numerous issues jeopardising the security of visitors, players, and residents alike. From the...

146
Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

305
We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...

126
Cloud computing has brought about a new age of convenience. You can store massive amounts of data, share it easily, and most technical aspects...

348
Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...

193
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....

192
iHLS has moved into its offices in Ra’anana this week. Such a move is certainly cause for celebration, especially when the new offices are...

92
North Korea is likely behind another cyber attack on South Korea’s digital infrastructure, United Press International reports. South Korea’s Air Force’s website has been...

iHLS Events

5

1021