Cyber Security

Cyber Security

border & offshore security

Attend Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishion LeZion West. Israel is a global leader...
russian hackers

Russian hacking attacks leave the victim with a mere 19 minutes to respond to an attack, according to data published by computer security company...
smart home devices

Some experts expect Earth to pass the threshold of 1 trillion internet-connected sensors within five years, so there is growing pressure to improve the...
technological front

Norway has been challenged by what it calls continued “electronic harassment” of critical communications systems and networks by the Russian government. To better protect...
crime solving

Police forces have become increasingly reliant on extraction software in recent years as smartphones have harvested more data about people’s behaviour. But it’s feared...
security

Software vulnerabilities are frequently published on the web, for example on the US National Vulnerability Database — the official register of security vulnerabilities tracked...
quantum

Concerns are growing over the security vulnerability of 5G networks which are predicted to transform the telecommunications industry in the next decade. A new...
hackers

Chinese espionage for western military technologies has reached a new stage. Chinese hackers have targeted over two dozen universities in the US and Canada...
email security

Both legacy and “next generation” secure email gateways are failing to prevent threats executable by humans on email. A new machine learning technology can...

The 5G next-generation wireless technology will play a major role in national critical infrastructures. However, as world competition over the super-fast 5G mobile networks...
offshore security

Attend Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishion LeZion West. Israel is a global leader...
ihls accelerator

Are you developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
quantum encryption

In the ‘hyper-connected’ 5G communications networks era, the issue of “network security” becomes critical. A quantum-safe technology can encrypt transmitted data using special quantum...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...

Natural disasters and wide scale emergencies require the cooperation of various agencies and the integration of developing technologies. A recent operational experiment took place,...
security accelerator

Are you developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
autonomous cars

Autonomous cars are still being developed, and this means that an ever growing quantity of data is a massed through cars' navigational technologies. Recently,...
darpa

The U.S. military researchers’ initiative to develop secure integrated circuit technology for trusted computing applications, ranging from manufacturing to systems integration goes on. Sources...
bitcoin

The concept that bitcoin could be used to help fund terrorists has been a long-standing concern among law enforcement and government agencies worldwide. Indeed,...

Recent progress in face recognition technologies also raises security concerns regarding privacy. Anticipating the use of such technologies by bad actors, companies are investing...

The Japanese government plans on strengthening its defenses against cyber attacks from China, among other nations. It aims to do so through regulating and...
anti-jamming

GPS technology has revolutionized modern warfare. Military organizations regularly depend on satellite technology for accurate positioning, timing and communications. But GPS signals received on...

iHLS Events