Cyber Security

Cyber Security

nuclear plants

20
Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing...
malware

19
Security researchers are increasingly seeing in countries outside the West to discover the newest, most creative and potentially most dangerous types of cyberattacks being...
smart cities

49
The latest trend in the business and technology worlds, the internet of things (IoT) seems to be everywhere. People and organizations are now demanding...
securing sporting events

96
Predictive technology will play a vital role in securing future major sport events. During a keynote speech on smart cities and the future of...
unmanned platforms

59
The Australian Defense Force (ADF) will be working towards the delivery of unmanned platforms for military operations, with an AU$50 million injection from the...
smart cities

68
Electricity grid operators in the U.S. experience near constant cyberattacks, with one utility recording approximately 10,000 cyberattacks a month. Cybersecurity issues can come up...
soldier systems

37
The US Army has been pushing to make systems more user-friendly to the average soldier in the field. Soldiers will have to operate systems...
cyber-defenses

48
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
communication encryption

87
The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
cybersecurity

72
The US NSA wants to make cybersecurity more profitable than cyber attacks. Neal Ziring, the NSA’s Capabilities Directorate technical director said recently: “I want...
cyber

108
The cyber sphere has been gaining increased importance regarding the conduct of states, security organizations and the business realm. The vital need to secure...
electronic warfare

53
U.S. Army trainers have successfully used cyber weapons and electronic warfare (EW) technology to thwart a simulated tank assault at a training exercise. The...

84
Senior army and technology officials, defense industry leaders and business representatives participated at the conference and exhibition organized by iHLS on offshore & perimeter...
aircraft systems connectivity

76
The increased scope and complexity of connectivity technology on aircrafts and in aviation infrastructure, such as networked air traffic control systems, makes their operators...
blockchain technology

104
Blockchain technology will help secure unmanned aircraft deliveries. The retail company Wal-Mart recently applied for a patent application entitled “Unmanned aerial delivery to secure...
autonomous vehicles

128
As more technologies are emerging in the field of autonomous vehicles, the assurance of their security has become a major imperative. A new real-time, type...
perimeter security

123
Fiber optic sensing solutions have been used for some time in a wide array of perimeter security applications to detect suspected intrusions. The slightest deviation...
cyber security

126
Asseco Poland is the biggest start-up in Poland, the 6th largest software developer in Europe and has been a leading force in the industry...
US air force

47
The US Air Force is looking for a personal voice assistant for its Air Operations and Combined Air Operations Centers. Would the Air Force...
physical security technology

56
  A new physical security technology has been taking the management of sensors further. Siemens’ Siveillance Viewpoint for physical security information management (PSIM) is part of...

105
Strategic installations and economic infrastructures along the borders, at sea and underwater have been a target of hostile states, terrorist organizations, and other elements....
Israeli cyber group

190
An Israeli cyber group is paying dividends while guarding secrecy concerning its products. NSO Group developed a software which assists governments and security organizations...

iHLS Events

5

1007