Cyber Security

Cyber Security

facebook

By Vickie Zisman Well, in the wake of all Facebook scandals, it's an appropriate title, isn't it? And the answer to the question is? – Neither;...
startup competition

iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...

The message from the intriguing Future Forces Conference held today was that armies are already adopting full autonomy technologies while keeping man-in-the-loop. The conference,...
iot

The Internet of Things (IoT), the network of interconnected devices embedded with computing and communication technology, is well underway in higher education institutions, from...
ihls security accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
future forces conference

Future security challenges will be dynamic and complex, says Mr. Marcel Lettre, Vice President, National Security in Lockheed Martin Government Affairs, in an exclusive...
defense export

Israel's defense export in 2017 reached $9.2 billion, according to figures published by SIBAT, the International Defense Cooperation Directorate of the Israel Ministry of...
cybersecurity

China’s first- and second-generation cybersecurity systems relied on blacklists and whitelists to screen out potential threats, but hackers can always find a way to...
ihls security accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...

New data demonstrates that only a tiny proportion of crime guns in Chicago were ever reported stolen to the Police Department. That and other...
future forces

Interested in innovation in the defense and security field? Join us and learn from the leading defense industries and the best experts about the...
soldier

A soldier is, among other things, a walking mass of information. Goggles, headsets, radios, computer tablets, all generate data. And there's a mass of...
accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
future forces

Interested in innovation in the defense and security field? Join us and learn from the leading defense industries and the best experts about the...
cybersecurity

By Ilan Segelman, Power Communication The multiple cyber attacks have led to an increasing awareness of the senior executives in organizations to the cyber attacks’...
future forces

Where Will You Be on May 9, 2018? Join us and learn from the leading defense industries and the best experts about the latest...
autonomous

One of the key drivers of the Internet of Industrial Things (IIoT) is automating systems that were previously operated manually. The IIoT helps these...
social media

What would happen if an unfriendly nation tried to take down the US power grid, or the air traffic control system, or blow up...
iphones

iPhones encrypt user data by default. Those in physical possession normally cannot access the phone’s data, such as contact list, saved messages, or photos,...
cybersecurity

Nearly 1,000 data-breaches occurred in the first-half of 2017. Each new breach raises fears that trust in the global digital economy is eroding. In...
accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
cybersecurity

While hackers have been constantly reaching out for new technologies, information security teams are also obliged to adopt advanced technological methods in order to...

iHLS Events