Cyber Security

Cyber Security

Prospect: Routine flights without isolation - within six months Following the increase in COVID-19 contamination in Israel and the huge number of citizens that were...
critical infrastructure

The way power grids are operated and managed has changed fundamentally in the last years with the integration of more renewable and decentralized energy...
first responders drone

When firefighters arrive on the scene of a fire, the most important need is to view hot spots while also being able to assess...
location data

Smartphone tracking data is never completely secure. This is the conclusion that can be drawn from the recent investigation in the US. Members of...
INNOTECH Expo

Regarding information leaks from the database: It’s a question of “when” rather than “if”. The cellular tracking technology - Obsolete  In a special panel regarding the...
smart city

The technologies are already here, substantial breakthroughs can be achieved in Israel’s smart city technologies, said Liora Shechter, CIO, Tel-Aviv Municipality. The transformation of cities...
voice spoofing

Privacy preserving methods are becoming increasingly important in enhancing consumer privacy and security as voice technologies become part of daily life. Consumers use voice...
autonomous car

Automation in vehicles is set to improve people’s lives, by improving road capacity and simply freeing up time that would have been previously spent...
video analytics

Video analytics software eliminates the drawbacks of traditional video surveillance systems by offering capabilities that are instrumental in detecting abnormalities and crimes, thereby ensuring...

The vast majority of people are concerned about the security and privacy practices of their connected IoT devices, and there is a growing need...
innotech expo

iHLS is proud to launch iHLS InnoTech Expo Tel-Aviv - Israel’s largest conference and exhibition for HLS and cyber technologies and innovation. The launch...

The world of computing has become more and more complex and demanding from both the management and technology points of view. Consumers expect the...
blockchain

Blockchain is expected to become more common as more industries look to this technology to solve for weaknesses in their current processes. It is...
blockchain

Blockchain technology will contribute to securing the American dollar. A blockchain initiative to make the US Dollar more like Bitcoin has been funded by...
quantum computing

Quantum computing is still in a development stage but it is expected to accelerate us into the future by impacting the landscape of artificial...
hardware vulnerabilities

About 70 percent of all cyberattacks are due to hardware vulnerabilities. The US Defense Advanced Research Projects Agency (DARPA) has developed a new generation...
coronavirus

The coronavirus pandemic is a global emergency scenario that requires readiness as part of the national preparedness strategy for emergency and crisis situations.  The suitable...
cybersecurity

More and more Military Forces have been establishing dedicated cyber organizations. Cyber attacks are as deadly as those faced on the physical battlefield, British...

A cyber attack on nuclear data is one of the highest concerns of states. Cyber threats to nuclear materials, facilities, command, control and communications...

Numerous applications, from financial services institutions to government agencies, and hospitals are designed for point-to-point communication and are not scalable. Furthermore, existing security standards...
InnoTech expo for HLS and cyber

iHLS InnoTech Expo Tel Aviv event will be held AS SCHEDULED on November 18-19, 2020 at Expo Tel Aviv, Pavilion 2 With growing HLS challenges,...
cybersecurity

Iran’s cyberattack in April on Israel’s water infrastructure aimed at raising chlorine levels in the country’s drinking water, according to a report by the...

iHLS Events