New Video Streaming Solutions for the Battlefield
                The video and metadata requirements of modern military and defense missions have been evolving rapidly, making live, real-time video delivery and management in the...            
            
        New Big Data Platform Predicts Trends in Business and Defense
                Gathering insights from big data regarding future trends requires data scientists’ expertise and can take weeks or even months. Now, an MIT spinout has...            
            
        Mounting Efforts to Regulate IoT Security
                While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...            
            
        DHS Seeking Top-Level Identity Security
                The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded a $749,241 Small Business Innovation Program (SBIR) contract to Digital...            
            
        Authentication Technology to Deliver Safer Transactions
                Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...            
            
        Smartphone Encryption Frustrates Law Enforcement
                Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data. Such...            
            
        World’s First Blockchain Secured Smartphone
                More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...            
            
        Severe Security Breach at London Heathrow Airport
                Heathrow Airport’s secret security planning has been revealed in files on a memory stick found in a London street. The documents outline routes and...            
            
        ISIS Makes Use of Bitcoin Anonymity
                The concept that bitcoin could be used to help fund terrorists has been a long-standing concern among law enforcement and government agencies worldwide. Indeed,...            
            
        Quantum Technology to Secure Autonomous Car
                Autonomous vehicle technology is an emerging global market. By 2025, the partially autonomous vehicles market is expected to be at 36 billion U.S. dollars...            
            
        AI Technology in 2019 Consumers Market: Predictions and Analysis
                Salesforce company alerts that in lack of proper rules and regulation , artificial intelligence (AI) might have a negative impact on social networks and...            
            
        Europe to Increase Control on Dual-Use Products Export
                Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...            
            
        iHLS Accelerator Startup: Blockchain Based Solution to Firearms Registration
                The recent wave of deadly terrorist attacks in Europe, particularly in Paris, has raised questions regarding illegal firearms, such as deactivated Kalashnikov rifles, that...            
            
        Will Blockchain Technology Revolutionize Defense Industries?
                The need for better data has been driving industries in large to adopt blockchain technology. Is blockchain going to change the global defense industry?...            
            
        iHLS Security Accelerator is Looking for Next Generation Startups!
                Are you a disruptive startup in the security field?
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...            
            
        Quantum Computing in the Wrong Hands – What’s at Stake?
                Advances in technology also have a darker side. The world relies on encryption to protect everything from credit card transactions to databases holding health...            
            
        Ransomware are Chasing After… Your Backup!
                Ransomware has become a thriving business in recent years, with several states’ decision to arm themselves with it, whether for military or profit purposes....            
            
        Quantum Budgets – What is the Goal?
                The field of quantum technology is not new, it has been studied by Physics scientist for decades. Today we are in the midst of...            
            
        iHLS Accelerator is Looking for Game-Changing Technologies
                We at the iHLS Security Accelerator are looking for disruptive ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...            
            
        South Korea Upgrades its Friend or Foe Technology
                South Korea’s arms procurement agency has started issuing a request for proposals for switching the decades-old Mode-4 Identification Friend or Foe, or IFF, system...            
            
        Two Steps to Protect Your Passwords
                Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...            
            
        How Have You Become A Cryptominer?
                Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. 
Hackers have discovered a new way to take advantage...            
            
        
 
            
