Cyber

Cyber

anti-jamming

GPS technology has revolutionized modern warfare. Military organizations regularly depend on satellite technology for accurate positioning, timing and communications. But GPS signals received on...
blockchain

Blockchain technology has a wide range of applications. Currently, it is tested as a means to ensure the privacy and security of aircraft flight...
security

The security solutions industry develops on a yearly basis, depending on market requirements and needs. Thus, there are real trends that technology developers are...
ihls security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
big data

The Big Data for Security and Intelligence 2019 Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security...

Increasing risks of cyber attacks pose a challenge for infrastructure security, such as the supply of electricity power, water and transportation. A joint exercise...
homeland security

17 years have passed since the 9/11 terrorist attacks, and the global public safety and homeland security market, technologies and industry are forecast to...
quantum

The field of quantum technology is not new, it has been studied by Physics scientist for decades. Today we are in the midst of...
ihls security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
big data

The Big Data for Security and Intelligence 2019 Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security...

As concerns over security risks for connected vehicles continue to build, an automotive cybersecurity company believes that a branch of machine learning called unsupervised...
iot security

Internet of Things (IoT) devices have a deserved reputation for being insecure, and Japan wants to do something about it. The country has just...

Ransomware has become a thriving business in recent years, with several states’ decision to arm themselves with it, whether for military or profit purposes....

Another Iranian cyber attack group is exposed as posing an immediate threat to Israel. The group, called APT39, is responsible for stealing a vast...
quantum-based solution

A dichotomy inherent in the Internet of Things (IoT) is that one wants the devices to be cheap, often lightweight and small, with low...

The growing development in artificial intelligence (AI) technologies is both reassuring and concerning. The use of such technologies ranges from autonomous weapon systems (AWS)...

The Defense Advanced Research Projects Agency (DARPA) has launched a program ensuring that critical data and transactions are secure and protected as they move...
iot

Industries are beginning to adopt Internet of Things (IoT) technologies in unprecedented scopes. However, security concerns continue to threaten IoT’s progress. A study by...
smart cities

We are in an era of intelligent and urgent urban innovation. Our homes are connected, our streets are thriving labyrinths of interconnectivity, and our...
quantum

Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

Summary of 2018 2018 has begun with a recovery from the events of 2017 such as WannaCry, Petya, and the information leak from Equifax -...

iHLS Events