Blockchain Tech Promises Better Security for IoT
A new blockchain-based method for enhancing IoT devices security may be under development. IBM has won a patent for the autonomous self-servicing of networked...
Cloud Service Provider Achieves “FedRAMP Ready” Status
Cloud service providers of US Federal agencies and government organizations must
meets strict standards and requirements in order to achieve a trusted provider status.
CloudPassage...
iHLS TV: Robot Soldiers and UAV Swarms
Interview with Richard Miller, security strategist and privacy consultant at IBM Global Technology, on cyber security.
Link to the full interview.
Articles featured in this video:
The Future...
Israeli Firm Cellebrite Reportedly Working With FBI to Unlock San Bernardino...
Israeli company Cellebrite has reportedly been appointed by the FBI to find an alternative way to unlock the iPhone 5c involved in the San...
Ransomware Threatens IoT Devices
Ransomware attack is one of the scenarios that security experts have been worrying about regarding the widening use of the Internet of Things. It...
Innovation at its Best: Ness Cyber Control will Showcase its Technology...
Cybersecurity and coping with cyber incidents are among the major and most relevant themes at the INNOTECH 2021 international conference and exhibition on cyber,...
What does Future Battlefield look like? Why are Autonomous Systems &...
At the forefront of the global defense industry, RAFAEL offers unique solutions that have revolutionized the field of autonomous unmanned aerial vehicles. RAFAEL is...
Ongoing Breach of International Criminal Court
The International Criminal Court (ICC) was hit last week in an ongoing cyberattack that is still being investigated.
A spokesman for ICC released a statement...
Is a cyber-Pearl Harbor likely?
A surprise cyber attack on U.S critical infrastructure – an imminent scenario?
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11...
Israeli Defense Companies Infiltrated? A Different Theory by iHLS
Most of Israel's technology, economics and news media recently recycled a post originally uploaded by the American information security blog Krebs on Security, citing...
Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI
July 15th, 2014
ISRAEL
Operation Protective Edge hits cyber realm
As Operation Edge rages on, hackers have increased their attempts to breach Israel, and while most of...
Kratos Solutions – From Cybersecurity to Target Drones
Kratos Defense & Security Solutions, Inc. announced that it has recently received contract awards worth $17 million in cyber security, command, control, communications, computers,...
Forecast for Global V2X Cybersecurity Market – Major Growth
Connected vehicle technology is an essential enabler for safer roads and future autonomous vehicle deployments, which both form part of the smart city concept....
Watch: Military Operations Game Changer
The US Army has been buying large amounts of small drones for use among regular units, and it could be that in the near...
Report: Cyber Attacks Against Middle East Embassies
Recent cyber attacks on Middle East embassies were conducted using targeted e-mail messages. The e-mail subject was the Syrian civil war, in an effort...
Don’t Miss Out on INNOTECH – the International Cyber, HLS and...
iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies, and Innovation event. A giant two-day exhibition with national pavilions...
HLS & Cyber Technologies Innovation Event
iHLS is proud to present Israel's largest innovation, technologies, and HLS event: The giant exhibition and conferences iHLS InnoTech Expo Tel Aviv.
With growing HLS...
New Cyber Regiment Established by UK Military
More and more Military Forces have been establishing dedicated cyber organizations. Cyber attacks are as deadly as those faced on the physical battlefield, British...
Hacking Gmail with 92% Success
A team of researchers, including an assistant professor at the University of California, Riverside Bourns College of Engineering, have identified a weakness believed to...
Next phase of cyber intrusions will include destruction, manipulation of data
James Clapper, director of U.S. intelligence, and other senior intelligence officers, have warned Congress that the next phase of escalating online data theft will...
IAI Will Supply Border Protection Systems in South American Country
Israel Aerospace Industries' (IAI) was recently awarded a contract to supply border protection systems in a South American country.
According to the contract worth...
Challenges in Terrorist Behavior Prediction and Detection by Technological Systems
By Or Shalom
Terrorism has been a major international challenge concerning the world ever since the French Revolution up until now. During the 1970s, the...