Cyber

Cyber

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
iot for security

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...
quantum computing

Several Federal agencies of the U.S. security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in...

Saudi oil company Aramco has been the victim of major cases of cyberintrusion and hacking attacks in the past and has sought to shore...

5G technology can be used for espionage purposes. According to David Vigneault, Director of the Canadian Security Intelligence Service (CSIS), 5G can be used...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...
the internet of things

The Internet of Things (IoT) has been making major shifts in the world of both consumer and industrial electronics, however, it opens a door...
cybersecurity

By Dainan Gilmore Israel has been a world leader in cybersecurity for the past 20 years already, and it keeps its strong positions in this...
Iot

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...

Advances in technology also have a darker side. The world relies on encryption to protect everything from credit card transactions to databases holding health...
security

The Internet of Things (IoT) transforms all fields, from the business to organizational and military spheres. IoT connected devices are hitting the market at...
smart gun

Smart guns are firearms equipped with technology that enables them to only be fired by an authorized user. Smart guns have the potential to...
iot for seucriyt

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...
fingerprint

Smartphone makers like Apple and Samsung typically use biometric technology in their phones so that people can use fingerprints to easily unlock their devices...
supply chain security

Lately, there’s been a noticeable rise in interest in supply chain security by the US Department of Homeland Security. A recent example for this...
inernational standard

The Internet of Things continues to grow at a rapid pace across a range of sectors. Most applications deploy existing technology and combine this...

The physical driver’s license is probably here to stay, but there are also other options that make identification and authentication more efficient, such as...

Are you developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We invite...
iot for security

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...

Deepfake (“deep learning" and "fake") is an artificial intelligence-based human image synthesis technique used to combine and superimpose existing images and videos onto source...
connectivity

Light will receive a strategic meaning as the new intelligent language in the digital age, especially with the arrival of the Internet of Things...

iHLS Events