Cyber

Cyber

Vehicle software is continuously gaining sophistication, creating new threat vectors in the process. As autonomous and connected vehicles become software driven, risks increase that...

BlackBerry’s Security Credential and Management System (SCMS) lets autonomous vehicles communicate with wired objects in the Intelligent Traffic Systems, as part of the Smart...

In order to protect mobile devices and applications, US Federal agencies need security capabilities that proactively protect devices against all types of cyber attacks,...

It appears that conventional computers are beginning to reach their limit. Quantum computers, which calculate using quantum phenomena, have been marked as the potential...

By 2021, there will be close to 13 connected devices per person in North America, according to Cisco’s estimate, and many consumers don’t have...
two-factor

In a quest to make online accounts safer, many services now offer two-factor authentication. Cybersecurity professionals have advised enabling two-factor to add an extra...

A new technology will help law enforcement not only to maximize situational awareness but also to manage fleet and human resources. The iris...

In order to improve its situational awareness capabilities, the U.S. Army is developing new tactical software that will allow commanders to communicate more effectively...
big data

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...

A  smart security system was found vulnerable for access to uploaded video recordings. Researchers...

As 2018 ends, it’s crucial to step back and reflect on some cybersecurity realities. Although US government cybersecurity...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...

US adversaries are more and more capable of penetrating US unclassified or barely protected systems. The bulk of...
at battlefield

Two widely used American war-fighting mapping applications are marked vulnerable to cyberattacks by hostile actors. After a year...
cybersecurity practitioner

A new and first-of-its-kind cyber course has attracted high interest in the Israeli military. The course is intended...

A new machine learning algorithm can break text-based CAPTCHA systems with less effort, faster, and with higher accuracy...

One of the U.S. most important asset is vulnerable to cyber attacks. The inadequate cybersecurity practices being used to protect the U.S ballistic missile...

The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
iot for security

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...
quantum computing

Several Federal agencies of the U.S. security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in...

Saudi oil company Aramco has been the victim of major cases of cyberintrusion and hacking attacks in the past and has sought to shore...

iHLS Events