Cyber Security

Cyber Security

big data

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...

A  smart security system was found vulnerable for access to uploaded video recordings. Researchers...

As 2018 ends, it’s crucial to step back and reflect on some cybersecurity realities. Although US government cybersecurity...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...

US adversaries are more and more capable of penetrating US unclassified or barely protected systems. The bulk of...
at battlefield

Two widely used American war-fighting mapping applications are marked vulnerable to cyberattacks by hostile actors. After a year...
cybersecurity practitioner

A new and first-of-its-kind cyber course has attracted high interest in the Israeli military. The course is intended...

A new machine learning algorithm can break text-based CAPTCHA systems with less effort, faster, and with higher accuracy...
Photo-illust.-US Air-Force-J.M.-Eddins-Jr

One of the U.S. most important asset is vulnerable to cyber attacks. The inadequate cybersecurity practices being used to protect the U.S ballistic missile...

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
iot for security

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...
quantum computing

Several Federal agencies of the U.S. security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in...

Saudi oil company Aramco has been the victim of major cases of cyberintrusion and hacking attacks in the past and has sought to shore...

5G technology can be used for espionage purposes. According to David Vigneault, Director of the Canadian Security Intelligence Service (CSIS), 5G can be used...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...
cyber, photo illus. by pixabay

The Internet of Things (IoT) has been making major shifts in the world of both consumer and industrial electronics, however, it opens a door...
cybersecurity

By Dainan Gilmore Israel has been a world leader in cybersecurity for the past 20 years already, and it keeps its strong positions in this...
Iot

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...

Advances in technology also have a darker side. The world relies on encryption to protect everything from credit card transactions to databases holding health...
security

The Internet of Things (IoT) transforms all fields, from the business to organizational and military spheres. IoT connected devices are hitting the market at...
iot for seucriyt

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...

Latest