Authentication

Authentication

covid ministry of defense

In Collaboration with iHLS as part of INNOFENSE Innovation Center The State of Israel is interested in finding a technological solution that would enable to...
innotech conference

iHLS is proud to present the International Cyber, Homeland Security Technologies, and Innovation Conference and Exhibition: INNOTECH 2021. November 17-18, 2021 at EXPO Tel Aviv,...
Photo illus. by Pixabay cyber-security

Remote work has become prevalent globally due to the COVID-19. While saving workers hours in traffic jams and enabling business continuity during lockdowns, remote...
SCADA

Critical infrastructure has become a target to more and more cyber attacks. Recent cyberattacks against oil pipeline giant Colonial Pipeline and other organizations in...
Photo illus. cyber security by Pixabay

No more reliance on perimeter-based legacy firewalls to prevent breaches. Zero Trust is a significant departure from the traditional network security models. The Zero...
covid-19 vaccine passport

The increasing need for secure Covid-19 "vaccine passports" all over the world, especially for domestic and international travel, in order to exempt cardholders from...
INNOTECH

iHLS is proud to present the international Homeland Security Technologies, Cyber, and Innovation Conference and Exhibition: INNOTECH 2021. iHLS is celebrating the return to normal...
cybersecurity

A new US intelligence assessment claims that over the course of the next 20 years, nation-states will see a rise in targeted offensive cyber-operations...
cybersecurity

“As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the mindset necessary...
cyber, photo illus. by pixabay

Almost every month during 2020, more than 1 million people in the US were affected by data breaches at health-care organizations, according to data...
Photo illust. drone delivery by Pixabay

As drone delivery is becoming more available, packages to the ground outside a home or business might be exposed to dangers such as “porch...
identity

The US federal authorities are accelerating the fight against identity counterfeit. The Department of Homeland Security (DHS) has begun a new nationwide public awareness...
AI, photo illus. by Pixabay

The technology trends expected to affect the security sector in 2021 are shaped by how and why technologies are used, rather than heralding the...
Silverfort, photo illus. network cyber by Pixabay

Accelerated technological changes have created a complex challenge to enterprise cybersecurity. Until not long ago, enterprise networks had a clear and protected perimeter with...

2020 has been a challenging year from the point of view of cybersecurity, with many organizations reacting to the unexpected impact of the COVID-19...

The Director General of the Israel National Cyber Directorate (INCD), Yigal Unna, attended the InnoTech broadcast on innovation, cyber, and HLS organized by iHLS,...
Photo illus. by Pixabay cyber-security

Terrorism and crime pose a direct threat to the security of citizens worldwide, and to international stability and prosperity. It is a persistent global...

Europol, the European police agency, recommends that EU law enforcement authorities should make ‘significant investments’ into developing new screening technologies that could help to...
safety test for drones

Unmanned aerial vehicles’ remote identification (RID) functionality has become one of three technologies, along with command and control (C2), and Detect and Avoid (DAA),...
photo illus. by Pixabay

Deepfakes are fake AI-generated images, footage or voices of real people. They have become a major security threat, and researchers, including many with funding...
blockchain

Blockchain technology will contribute to securing the American dollar. A blockchain initiative to make the US Dollar more like Bitcoin has been funded by...

A think tank urges EU governments to collaborate on a regulatory framework for tighter regulations on money laundering by terrorist organizations. ISIS is using...