Cyber Security

Cyber Security

5G illustration

The fifth-generation cellular network technology known as 5G provides broadband access, and is engineered to greatly increase the speed and responsiveness of wireless networks....
VPN

VPN is a virtual private network that provides freedom and security of work on the web. The main functions of a VPN are to...
Photo illustration US DVIDS

Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019. Register! Representatives from government, leading defense industries, military, security forces and law...
Illustration-of-Cyber-Intelligence-Elbit-Systems

Netherland’s law enforcement agencies are enhancing their cyber capabilities. Cyber Intelligence, a subsidiary of Elbit Systems, was selected to provide the Dutch National Police...
Photo illustration US Air Force

Emergence and development in robotics, biotechnology and nanotechnology will significantly impact the homeland security market in the forthcoming years, empassing border security for land,...
quantum security

Finding new and innovative ways to secure online sensitive data has become imperative. The Dutch bank group ABN Amro has joined forces with a...
IoT

IoT devices are an outcome of combining the worlds of information technology (IT) and operational technology (OT). Many IoT devices are the result of...
technology incubator

Early Stage, Deep Tech is the moto guiding the unique activity of Incubit, an Israeli startup incubator cultivating young startups making their first steps,...

Specializing in C4ISTAR, intelligence, cybersecurity and HLS solutions, TSG IT Advanced Systems is one of the leading sponsors of the coming Security and HLS...

Researchers from the University of Texas at San Antonio (UTSA) have developed the first framework to score the agility of cyber attackers and defenders,...
blockchain

As military forces increase the use of emerging tech in their operations, the number of data flow increases as well. The US army wants...

This happens only once a year! iHLS’ unique Startup Competition is a one-time opportunity for startups - in one day you can get exposure to...
startup competition

This happens only once a year! iHLS’ unique Startup Competition is a one-time opportunity for startups - in one day you can get exposure to...
startup competition

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense, and HLS fields to take part in the prestigious iHLS...
robot

Robotic systems are replacing human teams in various security missions. Unmanned ground vehicles (UGVs) are becoming an increasingly popular choice for companies that want...
Photo US Coast Guard

The energy industry needs more advanced security tools to help thwart threats to its increasingly connected infrastructure. With the industrial “internet of things” taking...
cyber attack

The number of DDoS attacks increased by 84% in the first quarter of 2019 compared to Q4 2018, according to new research from Kaspersky...
ai cyber security

    Earlier this year, the United States Defense Department has awarded a 20- month contract to a company that develops Artificial Intelligence technology that continuously...
cyber weapon

    Japan’s Ministry of Defense has announced plans to create and maintain malware cyber-weapons that it plans to use for defensive reasons. Once developed, Japan will...
startup competition

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...

Machine learning, deep learning, and other aspects of artificial intelligence (AI) have become major basis for advanced technologies in any field. In the defense...

Security environments are often a collection of disconnected layers of security products that leave gaps where threats can dwell undetected for hundreds of days....

iHLS Events