Cyber

Cyber

The 5G next-generation wireless technology will play a major role in national critical infrastructures. However, as world competition over the super-fast 5G mobile networks...
offshore security

Attend Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishion LeZion West. Israel is a global leader...
ihls accelerator

Are you developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
quantum encryption

In the ‘hyper-connected’ 5G communications networks era, the issue of “network security” becomes critical. A quantum-safe technology can encrypt transmitted data using special quantum...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...

Natural disasters and wide scale emergencies require the cooperation of various agencies and the integration of developing technologies. A recent operational experiment took place,...
security accelerator

Are you developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
autonomous cars

Autonomous cars are still being developed, and this means that an ever growing quantity of data is a massed through cars' navigational technologies. Recently,...
darpa

The U.S. military researchers’ initiative to develop secure integrated circuit technology for trusted computing applications, ranging from manufacturing to systems integration goes on. Sources...
bitcoin

The concept that bitcoin could be used to help fund terrorists has been a long-standing concern among law enforcement and government agencies worldwide. Indeed,...

Recent progress in face recognition technologies also raises security concerns regarding privacy. Anticipating the use of such technologies by bad actors, companies are investing...

The Japanese government plans on strengthening its defenses against cyber attacks from China, among other nations. It aims to do so through regulating and...
anti-jamming

GPS technology has revolutionized modern warfare. Military organizations regularly depend on satellite technology for accurate positioning, timing and communications. But GPS signals received on...
blockchain

Blockchain technology has a wide range of applications. Currently, it is tested as a means to ensure the privacy and security of aircraft flight...
security

The security solutions industry develops on a yearly basis, depending on market requirements and needs. Thus, there are real trends that technology developers are...
ihls security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
big data

The Big Data for Security and Intelligence 2019 Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security...

Increasing risks of cyber attacks pose a challenge for infrastructure security, such as the supply of electricity power, water and transportation. A joint exercise...
homeland security

17 years have passed since the 9/11 terrorist attacks, and the global public safety and homeland security market, technologies and industry are forecast to...
quantum

The field of quantum technology is not new, it has been studied by Physics scientist for decades. Today we are in the midst of...
ihls security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
big data

The Big Data for Security and Intelligence 2019 Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security...

iHLS Events