Cyber

Cyber

cybersecurity

China’s first- and second-generation cybersecurity systems relied on blacklists and whitelists to screen out potential threats, but hackers can always find a way to...
ihls security accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...

New data demonstrates that only a tiny proportion of crime guns in Chicago were ever reported stolen to the Police Department. That and other...
future forces

Interested in innovation in the defense and security field? Join us and learn from the leading defense industries and the best experts about the...
soldier

A soldier is, among other things, a walking mass of information. Goggles, headsets, radios, computer tablets, all generate data. And there's a mass of...
accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
future forces

Interested in innovation in the defense and security field? Join us and learn from the leading defense industries and the best experts about the...
cybersecurity

By Ilan Segelman, Power Communication The multiple cyber attacks have led to an increasing awareness of the senior executives in organizations to the cyber attacks’...
future forces

Where Will You Be on May 9, 2018? Join us and learn from the leading defense industries and the best experts about the latest...
autonomous

One of the key drivers of the Internet of Industrial Things (IIoT) is automating systems that were previously operated manually. The IIoT helps these...
social media

What would happen if an unfriendly nation tried to take down the US power grid, or the air traffic control system, or blow up...
iphones

iPhones encrypt user data by default. Those in physical possession normally cannot access the phone’s data, such as contact list, saved messages, or photos,...
cybersecurity

Nearly 1,000 data-breaches occurred in the first-half of 2017. Each new breach raises fears that trust in the global digital economy is eroding. In...
accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...
cybersecurity

While hackers have been constantly reaching out for new technologies, information security teams are also obliged to adopt advanced technological methods in order to...
ihls security accelerator

Apply Now! Are you a disruptive startup in the security field?  We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...

It is commonly assumed that the task of cyber attackers will always be easier than the cyber security teams’ mission, because the assailants need...
sensitive data

A new technology aims to help the US Department of Homeland Security (DHS) allow sensitive data to be shared and analyzed while it remains...
security accelerator

Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
cyber resiliency

The U.S. military’s weapons systems today are reliant on complex software and interconnectivity with a host of components, sensors and computer systems. The highly...
cyber threats

The increasing sophistication of cyber threats has become one of the main concerns of the aviation industry as airports and airlines realize they are...
IHLS

iHLS wishes all the dedicated readers and followers of our website and social media channels, customers, and conference and exhibition participants around the world...

Latest