Cyber

Cyber

Photo illust. US Air National Guard

Virtually all combat systems will soon be cyber-reliant. Sensors, weapons and networking technologies will all rely upon secure computing to perform most advanced combat...
technology

iHLS INNOFENSE - Innovation program for technological startups in the civilian and security sector, which will be operated by iHLS in collaboration with the...
Photo illustration US Navy

A new technology provides a quick, easy confirmation that the person you’re looking at is the person they say they are.  When the driver,...
Photo illust US Army, smartphone

How do you translate the powerful consumer technology of smartphones into something that can be useful and secure on the battlefield? Soldiers need something...
ihls innofense

iHLS INNOFENSE - Innovation program for technological startups in the civilian and security sector, which will be operated by iHLS in collaboration with the...
Photo illust US Air Force

The global open source intelligence (OSINT) market has grown at a phenomenal pace in the past few years due to improvements in the information...
Photo illust train Pixabay

Autonomous trains and trams are stepping stones to full self-driving vehicles, thanks to their defined routes, but retain some of the hardest challenges cars...
photo port illust Pixabay

Increasingly connected and automated vessels are becoming a cybersecurity challenge. In an incident last February, a deep draft vessel on an international voyage sailed...
Photo illus US Air Force

Because of the widespread use of GPS-style technologies – in navigation, mobile phone networks etc. – false signals have the potential to cause widespread...

Safeguarding IT requires a multi-layered approach that incorporates security technologies and user training. Geofencing creates a virtual fence on a user's network access. This limits...
smart watch

A new series of smart campus products now support contactless student IDs in Apple Wallet. Allegion, which specializes in seamless access technologies, announced that the...
Photo illlus. US Navy and Wikimedia

The US army is interested in cyberspace situational understanding. Situational awareness tools allow soldiers and commanders to track the progress and operations of cyber...
Photo illust. US Marines Corps

Cybersecurity is the name of the game when talking about future weapon systems. The Pentagon is exploring how artificial intelligence can help build more...
Photo illustration Echole Polytechnic Flickr

iHLS INNOFENSE - Innovation program for technological startups in the civilian and security sector, which will be operated by iHLS in collaboration with the...
Photo illust. US DoD, AIr Force

Most cybersecurity vulnerabilities today are unknown until an attack takes place, as conventional cybersecurity measures can only detect and prevent known threats. AI-based anomaly...
Photo quantum from NIST Wikimedia

Hacking-resistant communications networks, sensors that see through smog and around corners, and prototype computers that may someday smash the computational power of any existing...
quantum

Encryption systems have never been unbreakable, rather their security is based on the huge amount of time it would take for a classical computer...
Photo illust

The growing network of the internet of things (IoT) can make life more convenient by automating your home and delivering data wherever you are....
Photo illust US Air Force

Aircraft systems are increasingly reliant on networked communications systems, much like modern cars. The auto industry has already taken steps to address similar concerns...
Photo illustration NASA

Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019. Register! Representatives from government, leading defense industries, military, security forces and law...
min of defense

INNOFENSE - Innovation program for technological startups in the civilian and security sector, which will be operated by iHLS in collaboration with MAF’AT at...
cyber agility

A new way was developed to train defensive cyber operators to thwart attackers. US Army researchers have developed a cyber agility framework that, as...

iHLS Events