Cyber

Cyber

3d printing technology

44
The benefits of 3D printing technology are known, but less frequently discussed are the dangers. The open and accessible nature of the technology means...

52
As IoT matures, applications will be limited only by users’ imaginations. That’s the prediction of Lisa Litherland, a business architect who helps institutions create...
secure authentication

42
As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...
cyber

12
Japan’s Ministry of Defense (MoD) is considering increasing the number of soldiers in its Cyber Defense Unit (CDU) from around 110 to 1,000 and...
israeli air force

64
A unique technological initiative has been taken by the soldiers and graduates of the Israeli Air Force’s Ofek unit on behalf of children with...
ihls security accelerator

31
Side by side with the impressive weapon systems presented at the exhibition of the IAMD Missile Defense Conference, the hundreds of visitors had the...
cyber security

20
Not only Russia poses risks to power grid cybersecurity. Small- to mid-size energy companies are facing a variety of threats, says a new report...
electronic warfare

28
The US Army Research Lab has been increasingly focusing on fighting land wars against far more technologically sophisticated adversaries than it has in the...
military cybersecurity

10
Changes are expected in the US military cybersecurity infrastructure. After months of delay, the Trump administration is finalizing plans to revamp US military command...
biometric security

22
Recent years have shown that there are many difficulties in stopping attempts to evade or deceive biometric security systems. For this purpose IARPA’s (The...
cybersecurity law

21
There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...
nuclear plants

22
Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing...
malware

24
Security researchers are increasingly seeing in countries outside the West to discover the newest, most creative and potentially most dangerous types of cyberattacks being...
smart cities

60
The latest trend in the business and technology worlds, the internet of things (IoT) seems to be everywhere. People and organizations are now demanding...
securing sporting events

100
Predictive technology will play a vital role in securing future major sport events. During a keynote speech on smart cities and the future of...
unmanned platforms

62
The Australian Defense Force (ADF) will be working towards the delivery of unmanned platforms for military operations, with an AU$50 million injection from the...
smart cities

73
Electricity grid operators in the U.S. experience near constant cyberattacks, with one utility recording approximately 10,000 cyberattacks a month. Cybersecurity issues can come up...
soldier systems

39
The US Army has been pushing to make systems more user-friendly to the average soldier in the field. Soldiers will have to operate systems...
cyber-defenses

59
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
communication encryption

91
The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
cybersecurity

81
The US NSA wants to make cybersecurity more profitable than cyber attacks. Neal Ziring, the NSA’s Capabilities Directorate technical director said recently: “I want...
cyber

112
The cyber sphere has been gaining increased importance regarding the conduct of states, security organizations and the business realm. The vital need to secure...

iHLS Events

5

1023