Cyber Security

Cyber Security

ihls security accelerator

iHLS is inviting startups in this field to join the 8th cycle of its Security Accelerator, the world’s first accelerator in the HLS field....
cybersecurity

“As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the mindset necessary...

An oil spill such as the one that has drenched Israel’s coastline in tar, can be replicated by hackers that remotely take control of...
ransomware

Ransomware attacks on US healthcare have drastically increased in their sophistication and intensity over the last year, which is expected to continue into 2021. In...
iHLS activities

Leaving COVID-19 behind, we in iHLS are already working in full force to offer you a year full of fascinating first-class events focusing on...
perimeter & offshore security

iHLS is inviting startups in this field to join the 8th cycle of its Security Accelerator, the world’s first accelerator in the HLS field....
cyber

Deepfake technology involves the creation of synthetic media, generally, video material, using artificial intelligence and machine learning tools which allow for an individual’s facial...
counter drone

Unmanned aerial vehicles face a wide range of threat vectors in cyberspace while they are in flight, including the potential for an adversary to...
cybersecurity

According to a recent report from Unit 42, 83% of medical imaging devices are running on unsupported operating systems, making them potential avenues for...
electromagnetic spectrum

Over the last several years, the US Army has worked to build up its electronic warfare capabilities, pursuing a broad campaign of development, and...
automotive cybersecurity

The growing incidence of malicious cyber-attacks owing to the rising adoption of connected cars will propel the growth of the global automotive cybersecurity market....
cybersecurity

On February 5, hackers broke into the computer system of a facility that treats water for about 15,000 people in Oldsmar, Florida, managing to...
FirstNet

As the COVID-19 pandemic started, private industries and tech sectors around the world developed smartphone-based solutions to automate the manual contact tracing process. While...

While cybersecurity budgets of companies and organizations increase, security resilience decreases. An Israeli cybersecurity startup helps companies shore up their security posture, and strives ...
IoT

Connected medical devices remotely monitoring patient data are exposed to various threats, including data breaches if the information is not properly encrypted, viruses and...
smart city

Until not long ago, smart security technologies were not necessarily connected with the other municipal aspects, such as smart traffic management, waste management, etc....
photo illust quantum Pixabay

With an information society that transfers an increasingly large amount of personal data over public channels, information security has become a global challenge. Security...
cybersecurity

Honeypots are not a new technique in cybersecurity. A honeypot is a computer system that’s intended to attract cyberattacks, like a decoy. It mimics...
cyber attack

Zero-day cyber attacks are among the most dangerous threats to computer systems and can cause serious and lasting damage. As an example, the WannaCry...
cybersecurity

Iran and Russia signed an information security agreement that coordinates efforts between the two countries against cyber-related crimes. According to a report by Iran’s IRGC-linked...
cyber

Almost every month during 2020, more than 1 million people in the US were affected by data breaches at health-care organizations, according to data...

Many people already use fingerprint recognition technology to access their phones, but new research demonstrates a technique that maps out not only the unique...

iHLS Events