Cyber Security

Cyber Security

autonomous

Autonomous driving technology is trending towards becoming a big part of the future of the auto industry. However, the security challenges automakers and tech...
unmanned systems

If you are part of the global and Israeli unmanned systems and robotics ecosystem, don't miss the leading annual event in this field: AUS&R...
internet's routing

The internet is essential to the exchange of all manner of information. It is not a single network, but rather is a complex grid...
unmanned systems

If you are part of the global and Israeli unmanned systems and robotics ecosystem, don't miss the leading annual event in this field: AUS&R...

Law enforcement agencies in various countries are investigating drones used in crimes. These unmanned aerial vehicles deliver contraband, surveil military installations and sensitive institutions,...
blockchain

Once again, the retail giant Wal-Mart is using blockchain in order to increase effectivity and security. After it was awarded patents for a crypto-powered...
robotics

We are delighted to invite ground-breaking startups in the unmanned systems and robotics fields to take part in the sixth unmanned vehicles & robotics...
counter-terror

The US has been enhancing its anti-terrorist coordination measures with its allies. An agreement was recently signed by the US Homeland Security Secretary (DHS)...

IoT security is a substantial challenge as the use of the connected devices is becoming more and more widespread in every field. The consequences...

Stemming from the idea that disruptive technologies will change the character of warfare, the multidomain battle concept recognizes that the way armies will fight...
ai-based malware

Artificial intelligence could pose both opportunities and challenges as reported by the Center for a New American Security (CNAS), one of America’s top defense...

With the advent of technologies such as artificial intelligence, robotics, quantum computing, the Internet of Things, augmented reality, materials science, 3-D printing, and data...
unmanned systems

We are delighted to invite ground-breaking startups in the unmanned systems and robotics fields to take part in the sixth unmanned vehicles & robotics...

Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...

The "smart city" sounds like a digital utopia, a place where data eliminates first-world hassles, dangers and injustices. But there are some problems with...

Militaries across the world should urgently work to avoid the "unanticipated interaction" between individual AI systems, an electronic rights organisation has warned. Targeted at the...
VPN

VPN ,or virtual private network, is a term we hear more and more. This is understandable if you take into consideration the many varied...
fax

A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...

Major data breaches are a near-daily occurrence. Cyberthieves have been obtaining billions of passwords and other sensitive personal information. Behavioral biometrics is a new...

The proliferation of IoT technology has resulted in hundreds of thousands of connected systems being embedded in many a city’s critical infrastructures, enabling city...

The satellite communications that ships, planes and the military use to connect to the internet are vulnerable to hackers that, in the worst-case scenario,...
ea

Mobile devices contain access to all of our personal and corporate data. Eavesdropping is a prevailing threat among many on mobile phones, with technology...

iHLS Events