Cyber Security

Cyber Security

iHLS accelerator

  We are excited to offer you to apply to the third cycle of the iHLS security accelerator. We are looking for startups who are offering solutions...
IoT security

Recent cybercrime and hacking exploits have shown clearly that much of the IoT – devices, services and applications – is coming online largely in...
cyber security

The training and professional instruction of employees are not an easy task in the constantly changing field of cyber security. ISACA is adding a...
big data

A report on "Big Data & Data Analytics Market in Homeland Security and Public Safety: 2017-2022" forecasts that this industry's revenues will grow at...
commercialization

The commercialization of new technologies or products requires experience and expertise. The US Department of Homeland Security's Science and Technology Directorate (DHS S&T) is now...
communication security

Securing telephone communication is on the agenda of the US Department of Homeland Security’s (DHS) Science and Technology Directorate (S&T). The organization is “working to...
cyber security

  Cisco has decided to train 250,000 students in India over a period of time, with the aim to aid startups and build successful technology...
autonomous car cyber security

An autonomous car cyber security group will receive UK government funding as part of a plan to make the country a hub for the...
cyber-security

A new cyber-security system recently developed is based on behavior patterns. Lenvio Inc., a recent cyber security spin-off of R&K Cyber Solutions, has exclusively...
cyber

Germany's military, the Bundeswehr, presents a high-value target for hackers and foreign spy agencies – not only because of its military secrets, but also...
security breaches

Mobile phone apps have increasingly become vulnerable to security breaches. Virginia Tech researchers have recently discovered that the same apps we regularly use on...
cyber

Domestic cyber networks in the US need more security to uphold the defense of the nation, says the United States Transportation Command’s (TRANSCOM) leader....

iHLS, the global media leader in security technology, is inviting entrepreneurship in this field, with emphasis on dual-use technology, to join the third cycle of...
startup festival

  Many people are present this morning at the Startup Festival and Startup Live Competition organized by iHLS for the second year. The first 10 startups...
threat modeling

Augmented reality and virtual reality have the potential to serve as threat modeling tools that could enhance security professionals’ understanding of the threat landscape...
national cyber center

  The Israeli Cyber Companies Consortium (IC3) was recently awarded a contract worth tens of millions of dollars to establish a national cyber center in...
iot security

Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
cyber

By Arie Egozi While Israel is getting ready to a possible attack from Gaza or Lebanon, the silent war is around the corner and in...
border protection systems

Israel Aerospace Industries' (IAI) was recently awarded a contract to supply border protection systems in a South American country. According to the contract worth...
security camera

  Security vulnerabilities were found at a popular security product. A security researcher has recently published a vulnerability and proof-of-concept exploits in Google's Internet of...
insider threat

  Insider threats constitute a serious challenge to system administrators and IT security teams, as they exist in every company and organization, from small businesses...
cyber crime

Lockheed Martin will support the US Department of Defense's efforts against cyber criminals under a new contract. The company will continue its role as...