Cyber Security

Cyber Security

big data startup

Are you a startup with a ground-breaking technology in the Big Data field? iHLS invites you to pitch on a prestigious stage at the...
military installations

The US Defense Department is reviewing whether cellphones should be banned at the Pentagon - where 23,000 military and civilian personnel work at the...
software

US Federal research facilities rely on internet-connected devices to automate many basic building functions like ventilation, heating and security, as well as more hazardous...
cybersecurity

The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...
startup

Startups!!! If you’ve got a ground-breaking technology in the big data field, iHLS invites you to pitch on a prestigious stage at the conference....
big data

What is the connection between big data technologies and business disaster recovery procedures? Disaster recovery and business continuity technologies have come a long way...
anti terror

Britain has suffered quite a few terror attacks, mainly be Islamist Groups, with one to note is the London Underground attack in 2005. Now,...
big data

Most large organizations have billions of security-related logs per day and security analysts need to be able to automatically and intelligently parse critical data...
video systems

By Dorit Guterman, Ledico Security Systems, Tomer Nuri, Team Information and cyber security events can occur also via security cameras and other IoT devices. As result,...
military cloud computing

milCloud is a cloud-services product portfolio, managed by the US Defense Information Systems Agency (DISA) that features an integrated suite of capabilities designed to...
mobile app

Mobile apps often serve for monitoring and managing machines, and even entire industrial processes. However, the combination of apps and industrial control systems makes...
smart home

The message heard at the CES 2018 technology exhibition said smart speakers have become available for everyone and are part of daily life. However,...
defense data

Researchers evaluate that 99%-plus of the data that the US DoD collects is dark and was never exploited. Artificial intelligence powered by cloud computing...
device encryption

The FBI had been unable to access data from 7,775 devices in fiscal year 2017, a growing figure causing setbacks in cases from terrorism...
security flaws

Hackers now have a growing number of avenues by which to access personal information, and securing that information will only become more and more...
cyber capabilities

The recent protests in Iran and the regime’s attempts to block them shed light also on Tehran’s cyber capabilities. Offensive cyber operations have become...
big data

The IDF has been dealing daily with missions involving the extraction of information and insights from large masses of data collected by its vast...
satellite-drone communications

A new beam-switching technology was recently tested proving data transfer and anti-jamming measures between satellites and drones are more successful when two beams are...
cybersecurity

Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
defense industries

The Israeli defense industries have been actively participating in the Make in India initiative launched in 2014 and in other initiatives many years before....

The U.S Navy is about to equip it’s Littoral Combat Ship (a class of relatively small surface vessels intended for operations close to shore)...
cyberattacks

What were the major trends in the global cyberspace during 2017? According to a report by Clear Sky Cyber Security, the main attacks were...