Cyber Security

Cyber Security

communications

The United Nations has been upgrading its communications network. Currently, there are 14 peacekeeping operations around the world led by the United Nations. These...
encryption

Military communications can be targeted by enemy forces operations in an attempt to learn about intentions and gain superiority at the battlefield this way....
IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
bluetooth chip

Wireless access points can come in many forms, such as a router or an internet of things device. If a hacker gains access to...
cyber security

Cyber Security has become a major concern for any large organization or authority operating complex systems. Rafael Advanced Defense Systems, developer and manufacturer of leading...
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
5g network

5G wireless network deployments at major world events such as the 2018 Winter Games in PyeongChang have shown the great potential of a 5G-driven...
video analytics

Video analytics technology, the advanced security camera based algorithm analysis, has been undergoing a major revolution in recent years. Israel is at the forefront...
nuclear

A scary yet realistic scenario in the digital age could involve the following: attackers, sponsored by a rogue organization or radical state, gain access...
Cryptomining

Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...

U.S. special operators and other troops have been using advanced war-fighting applications for hand-held devices that contain software weaknesses that render them vulnerable to...
electronic warfare

A current gap in electronic warfare capabilities in terms of equipment and training in the US Army has driven the testing of new technologies....

Have you been developing a ground-breaking technology in the fields of unmanned systems, counter drones, terror tunnel detection, border security, etc.? We invite you to...
cyber attack

All US weapons that the Department of Defense tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report from the...
Router

Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...

Unmanned systems decrease the risk to soldiers and security teams by keeping them at a remote and secure site while streaming data for full...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
airport security

The protection of passengers, staff and aircraft in the airport and its vicinities from crime, terror and other threats has always been on high...
Censorship

A new app has been recently launched by Google, aimed at protecting users from state-sponsored censorship and limitations on freedom of information. The app,...
cybersecurity

A new Israel-India strategic partnership has been forged in the cybersecurity sphere. Tech Mahindra, and ELTA Systems, a group and subsidiary of Israel Aerospace...
biometric databases

Databases can encompass huge amounts of important data, yet if they are not connected with other related databases, their effectiveness might not be optimal....

iHLS Events