Cyber Security

Cyber Security

cyber

70
Is an extensive cyber attack expected again? The Ukrainian cyber security firm, ISSP, recently announced that it may have detected a new computer virus...
naval systems

81
Preparations for the 2017 Trident Warrior exercise, where US sailors are exposed to the newest innovations in naval systems warfare and provide feedback on...
intelligence

66
The US intelligence community guards some of the most closely held secrets and helps defend the country from attacks. However, even it needs protection,...
cyber security

34
India has been advancing one more stage on the way to mobile phone cyber security. The Indian government is finalising cyber security standards to...
biometric identification

26
Innovation in biometric identification offer an exciting new frontier in security, with the global biometric system market expected to reach an estimated $32.4 billion...
ISIS

34
The Islamic State group and other militant organizations have been creating precedents in terms of discussing cyber activities almost from the start. Most cyber...
cyber security

45
The cyber security sphere has become first priority in various organizations, and many resources have been invested in it. But what is the situation...

38
The developers of the latest technologies in the robotic vehicle and drone field are about to showcase the systems’ advanced capabilities during the unmanned...
autonomous car

20
The autonomous car revolution taking place right now increases the need to secure these vehicles from any jamming and spoofing of the autonomous navigation....
secure communication

20
Today, mathematical algorithms are used to encrypt text messages, banking transactions and health information. Intercepting these encrypted messages requires figuring out the exact algorithm...
drone

36
Advanced features have been recently introduced into familiar drone models, allowing lower noise flight, increased flight time and more advanced photography capabilities. Drone manufacturer DJI...
emergency

97
Apple's new operating system will come with an option to lock your iPhone's fingerprint scanner and bring up a hotline to the police. The...

65
Sensitive information conveyed by military mobile communication networks requires high levels of protection. A new cybersecurity software will secure mobile devices in the battlefield....
blockchain

136
The digital currency Bitcoin caught the Pentagon’s eyes as a potential cybersecurity shield. The US military has been open about their interest in Blockchain...
information security

77
By Ilan Segelman VP Sales & Business Development, Power Communications, and Operation Manager, Sophos Israel Machine Learning has become a buzzword that many suppliers use as...
cloud computing

183
When disaster strikes, it’s crucial that first responders have reliable access to a controlled network, allowing them to receive and deliver critical information while...
original approach to cyber security

104
New methods for cyber security have been trying to offer an original approach to cyber security. Cyber behavioral pattern analysis, a state-of-the-art commercial method,...
cyber crime

144
The US Homeland Security department has been increasing its fight against cyber crime. Infoblox Inc., the network control company that provides Actionable Network Intelligence,...
protect the protectors

82
First responders are constantly looking to improve, sharpen their senses and abilities and put their hands on the most innovative and useful equipment. Now,...
3d printers

175
All sorts of new cyberattacks have been rising in popularity over the last few years. Due to the rise in attacks on 3D printers,...
IT security

143
Researchers at New York University Abu Dhabi’s Design for Excellence lab (NYUAD) have developed new innovations in computer chip technology that present landmark achievements...
computer security

152
As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...

iHLS Events

5

1009