Cyber Security

Cyber Security

Photo US Coast Guard

The energy industry needs more advanced security tools to help thwart threats to its increasingly connected infrastructure. With the industrial “internet of things” taking...
cyber attack

The number of DDoS attacks increased by 84% in the first quarter of 2019 compared to Q4 2018, according to new research from Kaspersky...
ai cyber security

    Earlier this year, the United States Defense Department has awarded a 20- month contract to a company that develops Artificial Intelligence technology that continuously...
cyber weapon

    Japan’s Ministry of Defense has announced plans to create and maintain malware cyber-weapons that it plans to use for defensive reasons. Once developed, Japan will...
startup competition

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...

Machine learning, deep learning, and other aspects of artificial intelligence (AI) have become major basis for advanced technologies in any field. In the defense...

Security environments are often a collection of disconnected layers of security products that leave gaps where threats can dwell undetected for hundreds of days....

GPS spoofing is a malicious attack that broadcasts incorrect signals to deceive GPS receivers, while GPS manipulation modifies a real GPS signal. GPS satellites...

The deployment of 5G technologies offers opportunities for innovation, efficiency, and economic growth, but it may also present risks. The US administration seeks innovative...

A new study shows how vulnerable compressed AI models are to adversarial attack and offers a solution. Connected devices (IoT) such as smartphones, security...
perimeter & offshore security

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...

Given the proliferation of digital media, the question of what types of evidence are admissible in court, and how they should be handled, is...

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...

Attempts to hack public utilities are increasing in frequency and sophistication, making them harder to combat. One of the central targets of hackers are...

The cyber threat landscape is evolving, and current network security measures like signature-based detection techniques, firewalls and sandboxing fail to keep up. With corporate...
offshore security

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...
offshore security

Prominent representatives from the government, military, as well as industry and innovation ecosystem will attend the coming conference and exhibition Border, Perimeter and Offshore...
offshore security

The protection of the water, electricity and offshore oil and gas industries has been a major concern of governments especially since the 9/11 terrorist...

Coping with current cyber threats often requires a coordinated approach and international cooperation. Cyber drills are seen as a valuable tool for NATO cyber...
autonomous car

Researchers at Florida Polytechnic University are creating newly invented cyber attacks as a way to improve the security of cyber-physical systems (CPS). CPSs are...

Deep-learning algorithms excel at using shapes and color to recognize the differences between humans and animals or cars and trucks, for example. These systems...

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...

iHLS Events