Cyber

Cyber

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...
cybersecurity

As cyber-physical systems (CPS), such as autonomous vehicles, robotic systems, smart grid and unmanned aerial vehicles are becoming more complex, they also grow increasingly...

Almost 18 years have passed since 9/11, and the global public safety and homeland security market is forecast to go through major shifts. New...

Smart, internet-connected devices such as home hubs, smartphones and wearable tech which gather and analyze data are referred to as the Internet of Things...
secure iot

The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of...
id verification

Blockchain solutions are based on a time-stamped series of immutable record of data that is managed by cluster of computers not owned by any...
cybersecurity

Critical infrastructures can be the target for severe cybersecurity threats. An alert released recently by the FBI and Department of Homeland Security (DHS) reflected...
offshore security

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...
border & offshore security

Attend Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishion LeZion West. Israel is a global leader...
russian hackers

Russian hacking attacks leave the victim with a mere 19 minutes to respond to an attack, according to data published by computer security company...
smart home devices

Some experts expect Earth to pass the threshold of 1 trillion internet-connected sensors within five years, so there is growing pressure to improve the...
technological front

Norway has been challenged by what it calls continued “electronic harassment” of critical communications systems and networks by the Russian government. To better protect...
crime solving

Police forces have become increasingly reliant on extraction software in recent years as smartphones have harvested more data about people’s behaviour. But it’s feared...
security

Software vulnerabilities are frequently published on the web, for example on the US National Vulnerability Database — the official register of security vulnerabilities tracked...
quantum

Concerns are growing over the security vulnerability of 5G networks which are predicted to transform the telecommunications industry in the next decade. A new...
hackers

Chinese espionage for western military technologies has reached a new stage. Chinese hackers have targeted over two dozen universities in the US and Canada...
email security

Both legacy and “next generation” secure email gateways are failing to prevent threats executable by humans on email. A new machine learning technology can...
ew strategy

The US Army has been pursuing a new electronic warfare program. The Terrestrial Layer System (TLS) is an integrated EW and signals intelligence system...

iHLS Events